Data Confidentiality in Mobile Ad hoc Networks

Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours’ data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2) to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs), as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.

[1]  Panagiotis Papadimitratos,et al.  Securing Mobile Ad Hoc Networks , 2004, Mobile Computing Handbook.

[2]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[3]  Hussein Zedan,et al.  Security Solution for Mobile Ad Hoc Network of Networks (MANoN) , 2009, 2009 Fifth International Conference on Networking and Services.

[4]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[5]  Dharma P. Agrawal,et al.  Security in Wireless Ad Hoc Networks , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.

[6]  Yongguang Zhang,et al.  Security in Mobile Ad-Hoc Networks , 2005 .

[7]  Yvo Desmedt,et al.  Threshold cryptography , 1994, Eur. Trans. Telecommun..

[8]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[9]  P. Khatri,et al.  A Survey on Security issues in Mobile ADHOC networks , 2009 .

[10]  Brian Haberman,et al.  Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology , 2006, IEEE Communications Magazine.

[11]  Ekata Mehul,et al.  Security in Mobile Ad Hoc Networks , 2009 .

[12]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[13]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[14]  Subir Kumar Sarkar,et al.  Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications , 2007 .

[15]  Charikleia Zouridaki Security in Mobile Ad-Hoc Networks , 2008 .

[16]  V. S. Sheeba,et al.  Security in Mobile Ad-Hoc Networks , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).

[17]  Stephen T. Kent,et al.  Securing the Nimrod routing architecture , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.

[18]  Sheng-Ti Li,et al.  Enhanced Security Design for Threshold Cryptography in Ad Hoc Network Sheng-Ti Li , , 2004 .

[19]  Ritu Chadha,et al.  Policy-Driven Mobile Ad hoc Network Management , 2007 .

[20]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[21]  Iman Almomani END-TO-END SECURITY SOLUTION FOR WIRELESS MOBILE AD HOC NETWORK ( WMANET ) , 2007 .

[22]  Chai-Keong Toh,et al.  Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks , 2001, IEEE Commun. Mag..

[23]  Yvo Desmedt,et al.  Threshold Cryptosystems , 1989, CRYPTO.

[24]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .

[25]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[26]  Jameela Al-Jaroodi Security Issues at the Network Layer in Wireless Mobile Ad Hoc Networks , 2005, ICWN.

[27]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[28]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..