Skip to main content
Log in

An Adaptive and Predictive Security Model for Mobile Ad hoc Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without any centralized authority. These unique characteristics coupled with the growing concerns for security attacks demand an immediate solution for securing the ad hoc network, prior to its full-fledged deployment in commercial and military applications. So far, most of the research in mobile ad hoc networks has been primarily focused on routing and mobility aspects rather than securing the ad hoc networks themselves. Due to ever increasing security threats, there is a need to develop schemes, algorithms, and protocols for a secured ad hoc network infrastructure. To realize this objective, we have proposed a practical and effective security model for mobile ad hoc networks. The proposed predictive security model is designed using a fuzzy feedback control approach. The model is based on identifying critical network parameters that are affected by various types of attacks and it continuously monitors those parameters. Once we measure the relative change in these parameter values, we could detect the type of attack accurately and protect the system, without compromising its effectiveness. Experimental results of the model simulated for selected packet mistreatment attacks and routing attacks are very promising.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. J.-P. Hubaux, L. Buttyan and S. Capkun, "The Quest for Security in Mobile Ad Hoc Networks", Proceedings of MobiHoc, 2001.

  2. F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks", Proceedings of Security Protocols Workshop, 1999.

  3. P. Vinayakraj-Jani, "Security Within Ad Hoc Networks", Proceeding of PAMPAS Workshop, September 2002.

  4. K. Wrona, "Distributed Security: AdHoc Networks & Beyond", Proceedings of PAMPAS Workshop, September 2002.

  5. P. Michiardi and R. Molva, "Simulation-Based Analysis of Security Exposures in Mobile Ad Hoc Networks", Proceedings of European Wireless Conference, 2002.

  6. B. Awerbuch, D. Holmer, C. Nita-Rotaru and H., "An On-Demand Secure Routing Protocol Resilent to Byzantine Failures", Proceedings of ACM Workshop on Wireless Security (WiSe), 2002.

  7. S. Marti, T.J. Giuli, K. Lai and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", in Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, 2000.

  8. P. Papadimitratos and Z.J. Haas, “Secure Routing for Mobile Ad Hoc Networks”, Mobile Computing and Communications Review, Vol. 6, No. 4, 2002.

  9. Y.-C. Hu, A. Perrig and D.B. Johnson, “Ariadne: ASecure On-Demand Routing Protocol for AdHoc Networks”, Proceedings of MobiCom, 2002.

  10. “Book of Visions 2001 Vision of the Wireless World”, Wireless World Research Forum, Working Copy, December 2001.

  11. P. Michiardi and R. Molva, “Prevention of Denial of Service Attacks and Selfishness in Mobile Ad Hoc Networks”, Research Report RR-02-063, January 2002.

  12. S. Buchegger and J.-Y. Le Boudec, “Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks”, in Proceedings of 10th Euromicro Workshop on Parallel, Distributed and Network-Based Processing, 2002.

  13. P. Michiardi and R. Molva, “Core: A COllaborative REputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks”, in Proceedings of Communication and Multimedia Security Conference, 2002.

  14. L. Butty´an and J.-P. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks”, ACM Journal for Mobile Networks (MONET), 2003.

  15. S. Buchegger and J.-Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes-Fairness In Distributed Ad-hoc NeTworks”, Proceedings of MobiHoc, 2002.

  16. G. Avoine and S. Vaudenay, “Cryptography with Guardian Angels: Bringing Civilization to Pirates”, ACM Mobile Computing and Communications Review (MC2R), Vol. 6, No. 4, 2002.

  17. A. Kumar and R. Ragade, “X-REF: An Extended Reliability Evaluation Framework for Computer Systems Using Fuzzy Logic”, Journal of Computer and Software Engineering, Vol. 2, No. 4, 1994.

  18. GloMoSim at http://pcl.cs.ucla.edu/projects/glomosim/.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Alampalayam, S., Kumar, A. An Adaptive and Predictive Security Model for Mobile Ad hoc Networks. Wireless Personal Communications 29, 263–281 (2004). https://doi.org/10.1023/B:WIRE.0000047074.61412.d8

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:WIRE.0000047074.61412.d8

Navigation