An Efficient Trusted Computing Base for MANET Security

Devices participating in mobile ad hoc networks (MANET) are expected to strictly adhere to a uniform routing protocol to route data packets among themselves. Unfortunately, MANET devices, composed of untrustworthy software and hardware components, expose a large attack surface. This can be exploited by attackers to gain control over one or more devices, and wreak havoc on the MANET subnet. The approach presented in this paper to secure MANETs restricts the attack surface to a single module in MANET devices a trusted MANET module (TMM). TMMs are deliberately constrained to demand only modest memory and computational resources in the interest of further reducing the attack surface. The specific contribution of this paper is a precise characterization of simple TMM functionality suitable for any distance vector based routing protocol, to realize the broad assurance that “any node that fails to abide by the routing protocol will not be able to participate in the MANET”.

[1]  Paul Ward,et al.  Trusted computing for protecting ad-hoc routing , 2006, 4th Annual Communication Networks and Services Research Conference (CNSR'06).

[2]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[3]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[4]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[5]  Victor C. M. Leung,et al.  Secure routing with tamper resistant module for mobile Ad hoc networks , 2003, MOCO.

[6]  Mahalingam Ramkumar,et al.  Minimal trusted computing base for MANET nodes , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.

[7]  Mahalingam Ramkumar,et al.  A Framework for Dual-Agent MANET Routing Protocols , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[8]  B. Lampson,et al.  Authentication in distributed systems: theory and practice , 1991, TOCS.

[9]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[10]  Mahalingam Ramkumar On the scalability of an efficient “Nonscalable” key distribution scheme , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[11]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[12]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..