Wireless networking security: open issues in trust, management, interoperation and measurement

The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve security mechanisms. The design, development and evaluation of security techniques must begin with a thorough analysis of the requirements and a deeper understanding of the approaches that are practical within the system constraints. In this paper, we investigate the recent advances in wireless security from theoretical foundations to evaluation techniques, from network level management to end user trust inference and from individual protocol to hybrid systems. We identify the open security issues associated with trust, management, interoperation and measurement. These problems, whose solutions are different in nature and scale from their companions in wired networks, must be properly addressed to establish confidence in the security of wireless networking environments.

[1]  Joseph P. Macker,et al.  Internet-Based Mobile Ad Hoc Networking , 1999, IEEE Internet Comput..

[2]  Jean-Pierre Hubaux,et al.  A Fair Scheduling for Wireless Mesh Networks , 2005 .

[3]  Haiyun Luo,et al.  Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..

[4]  Christian Damsgaard Jensen,et al.  Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications , 2002 .

[5]  John S. Baras,et al.  Ant-based adaptive trust evidence distribution in MANET , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[6]  Paramvir Bahl,et al.  Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks , 2001, PODC '01.

[7]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[8]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[9]  Chita R. Das,et al.  A novel caching scheme for improving Internet-based mobile ad hoc networks performance , 2006, Ad Hoc Networks.

[10]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[11]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[12]  Randy H. Katz,et al.  Secure Authentication System for Public WLAN Roaming , 2005, Mob. Networks Appl..

[13]  Shambhu Upadhyaya,et al.  Securing Information through Trust Management in Wireless Networks , 2004 .

[14]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[15]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[16]  Shouhuai Xu,et al.  Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[17]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[18]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[19]  Li Li,et al.  IP-based access network infrastructure for next-generation wireless data networks , 2000, IEEE Wirel. Commun..

[20]  Ying-Dar Lin,et al.  Multihop cellular: a new architecture for wireless communications , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[21]  A. Tomlinson,et al.  Security challenges in the personal distributed environment , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[22]  Jun-Hong Cui,et al.  Reducing multicast traffic load for cellular networks using ad hoc networks , 2006, IEEE Trans. Veh. Technol..

[23]  Xuemin Shen,et al.  IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks , 2004, IEEE Wireless Communications.

[24]  J. V. D. Merwe,et al.  Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .

[25]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[26]  Georgios Kambourakis,et al.  Performance Evaluation of Public Key-Based Authentication in Future Mobile Communication Systems , 2004, EURASIP J. Wirel. Commun. Netw..

[27]  Patrick Maillé Allowing multi-hops in cellular networks: an economic analysis , 2005, MSWiM '05.

[28]  J. Baras,et al.  Autonomous Trust Establishment 1 , 2005 .

[29]  Wei Liang,et al.  Integration of authentication and mobility management in third generation and WLAN data networks , 2005, Wirel. Commun. Mob. Comput..

[30]  Lichun Bao,et al.  Personal AP protocol for mobility management in IEEE 802.11 systems , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[31]  Ness B. Shroff,et al.  Transmission scheduling for efficient wireless utilization , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[32]  Thomas F. La Porta,et al.  Exploiting open functionality in SMS-capable cellular networks , 2008, J. Comput. Secur..

[33]  David Levin,et al.  Survivable mobile wireless networks: issues, challenges, and research directions , 2002, WiSE '02.

[34]  Jiejun Kong,et al.  Providing Multi-layer Security Support for Wireless Communications across Multiple Trusted Domains , 2022 .

[35]  P. Lamsal Understanding Trust and Security , 2001 .

[36]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[37]  Randy H. Katz,et al.  Host Mobility Using an Internet Indirection Infrastructure , 2005, Wirel. Networks.

[38]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[39]  Haiyun Luo,et al.  UCAN: a unified cellular and ad-hoc network architecture , 2003, MobiCom '03.

[40]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[41]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.

[42]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[43]  Simson L. Garfinkel,et al.  PGP: Pretty Good Privacy , 1994 .

[44]  T. Dierks,et al.  The TLS protocol , 1999 .

[45]  Donald F. Towsley,et al.  Comparison of inter-area rekeying algorithms for secure wireless group communications , 2002, Perform. Evaluation.

[46]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[47]  Markus Jakobsson,et al.  A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks , 2003, Financial Cryptography.

[48]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.

[49]  Dirk Westhoff,et al.  Charging support for ad hoc stub networks , 2003, Comput. Commun..

[50]  Randeep Bhatia,et al.  ICAM: integrated cellular and ad hoc multicast , 2006, IEEE Transactions on Mobile Computing.

[51]  Bernard Aboba,et al.  Proxy Chaining and Policy Implementation in Roaming , 1999, RFC.

[52]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[53]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[54]  Brian L. Mark,et al.  A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.

[55]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[56]  TowsleyDon,et al.  Comparison of inter-area rekeying algorithms for secure wireless group communications , 2002 .

[57]  Bharat K. Bhargava,et al.  Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad Hoc Network (CAMA) , 2004, Mob. Networks Appl..

[58]  J.-P. Hubaux,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[59]  Vaduvur Bharghavan,et al.  Challenges and Solutions to Adaptive Computing and Seamless Mobility over Heterogeneous Wireless Networks , 1997, Wirel. Pers. Commun..

[60]  Randy H. Katz,et al.  Emerging challenges: Mobile networking for “Smart Dust” , 2000, Journal of Communications and Networks.

[61]  Licia Capra,et al.  Engineering human trust in mobile system collaborations , 2004, SIGSOFT '04/FSE-12.

[62]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[63]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[64]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[65]  John Lee,et al.  Integration of IP mobility and security for secure wireless communications , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[66]  Barbara E. Bullock,et al.  Best Current Practices for Wireless Internet Service Provider (WISP) Roaming , 2002 .

[67]  Songwu Lu,et al.  Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.

[68]  M. Riguidel,et al.  Security architecture for heterogeneous distributed computing systems , 2004, 38th Annual 2004 International Carnahan Conference on Security Technology, 2004..

[69]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[70]  David E. Culler,et al.  System architecture directions for networked sensors , 2000, SIGP.

[71]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[72]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[73]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[74]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[75]  Jun Li,et al.  Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support , 2002, MOCO.

[76]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[77]  Chunming Qiao,et al.  Integrated cellular and ad hoc relaying systems: iCAR , 2001, IEEE J. Sel. Areas Commun..

[78]  Robert H. Deng,et al.  Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.

[79]  Wade Trappe,et al.  An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.

[80]  Tao Jiang,et al.  Cooperative games, phase transitions on graphs and distributed trust in MANET , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[81]  Chung-wei Lee,et al.  Trust based adaptive on demand ad hoc routing protocol , 2004, ACM-SE 42.

[82]  Haiyun Luo,et al.  Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .

[83]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[84]  Markus Jakobsson,et al.  A charging and rewarding scheme for packet forwarding in multi-hop cellular networks , 2003, MobiHoc '03.