Abstract
Ad hoc networks are created dynamically and maintained by individual nodes comprising the network. They do not require a preexisting architecture for communication purposes and they do not rely on any type of wired infrastructure; in an ad hoc network, all communication occurs through a wireless medium. With current technology and the increasing popularity of notebook computers, interest in ad hoc networks has peaked. Future advances in technology will allow us to form small ad hoc networks on campuses, during conferences, and even in our own home environment. Further, the need for easily portable ad hoc networks in rescue missions and in situations in rough terrain are becoming extremely common.
In this chapter we investigate the principal security issues for protecting ad hoc networks at the data link and network layers. The security requirements for these two layers are identified and the design criteria for creating secure ad hoc networks using multiple lines of defense against malicious attacks are discussed. Furthermore, we explore challenge–response protocols based on symmetric and asymmetric techniques for multiple authentication purposes through simulations and present our experimental results. In Particular, we implement the Advanced Encryption Standard (AES), RSA, and message digest version 5 (MD5) algorithms in combination with ISO/IEC 9798-2 and ISO/IEC 9798-4, and Needham–Schroeder authentication protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
N. Komninos, D. Vergados, C. Douligeris: Layered security design for mobile ad-hoc networks, J. Comput. Secur. 25(2), 121–130 (2006)
N. Komninos, D. Vergados, C. Douligeris: Authentication in a layered security approach for mobile ad hoc networks, J. Comput. Secur. 26(5), 373–380 (2007)
L. Zhou, Z.J. Haas: Securing ad hoc networks, IEEE Netw. Mag. 13(6), 24–30 (1999)
J.-S. Lee, C.-C. Chang: Preserving data integrity in mobile ad hoc networks with variant Diffie–Hellman protocol, Secur. Commun. Netw. J. 1(4), 277–286 (2008)
A.J. Menezes, S.A. Vanstone, P.C. Van Oorschot: Handbook of Applied Cryptography (CRC Press, Boca Raton 2004)
L. Harn, J. Ren: Design of fully deniable authentication cervice for e-mail applications, IEEE Commun. Lett. 12(3), 219–221 (2008)
X. Li, L. Zhiwei, A. Ye: Analysis and countermeasure of selfish node problem in mobile ad hoc network, 10th International Conference on Computer Supported Cooperative Work in Design (CSCWD’06), May 2006 (2006) 1–4
C. Basile, Z. Kalbarczyk, R.K. Iyer.: Inner-circle consistency for wireless ad hoc Networks, IEEE Trans. Mobile Comput. 6(1), 39–55 (2007)
Y.-C. Hu, A. Perrig, D.B. Johnson.: Wormhole attacks in wireless networks, IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)
B. Kannhavong, H. Nakayama, A. Jamalipour: SA-OLSR: Security aware optimized link state routing for mobile ad hoc networks, IEEE International Conference on Communications (ICC’08), 19–23 May 2008 (2008) 1464–1468
J. Dwoskin, D. Xu, J. Huang, M. Chiang, R. Lee: Secure key management architecture against sensor-node fabrication attacks, IEEE Global Telecommunications Conference (GLOBECOM’07), 26–30 Nov. 2007 (2007) 166–171
M. Hejmo, B.L. Mark, C. Zouridaki, R.K. Thomas: Design and analysis of a denial-of-service-resistant quality-of-service signaling protocol for MANETs, IEEE Trans. Vehic. Technol. 55(3), 743–751 (2006)
C. Perkins: Ad Hoc Networking (Addison-Wesley, Boston, USA 2000)
S.P. Alampalayam, A. Kumar: Security model for routing attacks in mobile ad hoc networks, IEEE 58th Vehicular Technology Conference (VTC 2003-Fall), Vol. 3, 6–9 Oct. 2003 (2003) pp. 2122–2126
P. Papadimitratos, Z.J. Haas: Secure routing for mobile ad hoc networks, SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio (2002)
D. Johnson, Y. Hu, D. Maltz: Dynamic source routing, RFC 4728 (2007)
C. Perkins, E. Belding-Royer, S. Das: Ad hoc on-demand distance-vector routing (AODV), RFC 3561 (2003)
J. Hubaux, L. Buttyán, S. Capkun: The quest for security in mobile ad hoc networks, Proc. 2nd ACM international symposium on Mobile ad hoc networking and computing, USA (2001)
Y. Hu, A. Perrig, D. Johnson: Ariadne: A Secure on-demand routing protocol for ad hoc networks, ACM Workshop on Wireless Security (ACM MobiCom) (2002)
K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer: A secure routing protocol for ad hoc networks, Proc. 2002 IEEE Int. Conference on Network Protocols (ICNP), November 2002 (2002)
OPNET Technologies Inc.: http://www.opnet.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Komninos, N., Vergados, D., Douligeris, C. (2010). Security for Ad Hoc Networks. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-04117-4_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04116-7
Online ISBN: 978-3-642-04117-4
eBook Packages: EngineeringEngineering (R0)