Abstract
Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without any centralized authority. These unique characteristics coupled with the growing concerns for security attacks demand an immediate solution for securing the ad hoc network, prior to its full-fledged deployment in commercial and military applications. So far, most of the research in mobile ad hoc networks has been primarily focused on routing and mobility aspects rather than securing the ad hoc networks themselves. Due to ever increasing security threats, there is a need to develop schemes, algorithms, and protocols for a secured ad hoc network infrastructure. To realize this objective, we have proposed a practical and effective security model for mobile ad hoc networks. The proposed predictive security model is designed using a fuzzy feedback control approach. The model is based on identifying critical network parameters that are affected by various types of attacks and it continuously monitors those parameters. Once we measure the relative change in these parameter values, we could detect the type of attack accurately and protect the system, without compromising its effectiveness. Experimental results of the model simulated for selected packet mistreatment attacks and routing attacks are very promising.
Similar content being viewed by others
References
J.-P. Hubaux, L. Buttyan and S. Capkun, "The Quest for Security in Mobile Ad Hoc Networks", Proceedings of MobiHoc, 2001.
F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks", Proceedings of Security Protocols Workshop, 1999.
P. Vinayakraj-Jani, "Security Within Ad Hoc Networks", Proceeding of PAMPAS Workshop, September 2002.
K. Wrona, "Distributed Security: AdHoc Networks & Beyond", Proceedings of PAMPAS Workshop, September 2002.
P. Michiardi and R. Molva, "Simulation-Based Analysis of Security Exposures in Mobile Ad Hoc Networks", Proceedings of European Wireless Conference, 2002.
B. Awerbuch, D. Holmer, C. Nita-Rotaru and H., "An On-Demand Secure Routing Protocol Resilent to Byzantine Failures", Proceedings of ACM Workshop on Wireless Security (WiSe), 2002.
S. Marti, T.J. Giuli, K. Lai and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", in Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, 2000.
P. Papadimitratos and Z.J. Haas, “Secure Routing for Mobile Ad Hoc Networks”, Mobile Computing and Communications Review, Vol. 6, No. 4, 2002.
Y.-C. Hu, A. Perrig and D.B. Johnson, “Ariadne: ASecure On-Demand Routing Protocol for AdHoc Networks”, Proceedings of MobiCom, 2002.
“Book of Visions 2001 Vision of the Wireless World”, Wireless World Research Forum, Working Copy, December 2001.
P. Michiardi and R. Molva, “Prevention of Denial of Service Attacks and Selfishness in Mobile Ad Hoc Networks”, Research Report RR-02-063, January 2002.
S. Buchegger and J.-Y. Le Boudec, “Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks”, in Proceedings of 10th Euromicro Workshop on Parallel, Distributed and Network-Based Processing, 2002.
P. Michiardi and R. Molva, “Core: A COllaborative REputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks”, in Proceedings of Communication and Multimedia Security Conference, 2002.
L. Butty´an and J.-P. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks”, ACM Journal for Mobile Networks (MONET), 2003.
S. Buchegger and J.-Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes-Fairness In Distributed Ad-hoc NeTworks”, Proceedings of MobiHoc, 2002.
G. Avoine and S. Vaudenay, “Cryptography with Guardian Angels: Bringing Civilization to Pirates”, ACM Mobile Computing and Communications Review (MC2R), Vol. 6, No. 4, 2002.
A. Kumar and R. Ragade, “X-REF: An Extended Reliability Evaluation Framework for Computer Systems Using Fuzzy Logic”, Journal of Computer and Software Engineering, Vol. 2, No. 4, 1994.
GloMoSim at http://pcl.cs.ucla.edu/projects/glomosim/.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Alampalayam, S., Kumar, A. An Adaptive and Predictive Security Model for Mobile Ad hoc Networks. Wireless Personal Communications 29, 263–281 (2004). https://doi.org/10.1023/B:WIRE.0000047074.61412.d8
Issue Date:
DOI: https://doi.org/10.1023/B:WIRE.0000047074.61412.d8