A Survey on Security Vulnerabilities in Wireless Ad Hoc High Performance Clusters

Abstract Wireless ad hoc high performance clusters extend the paradigm of contemporary wired cluster architectures to present the great possibility of achieving ubiquitous distributed computing in the near future. The explosion of mobile devices such as smart phones, tablets, laptops and wearable tech that are nearing workstation grade performance benchmarks make the concept of wireless clusters a reality. However, the physical characteristics of the wireless medium and distributed nature of computing gives rise to many targeted security vulnerabilities that need to be properly identified and addressed. This paper presents a survey on security issues, threats, challenges and contingency measures that are suitable to reduce the risk of occurrence and impact should such threats materialize. Security issues that impact battery life of nodes, performance of the cluster and data integrity are analyzed carefully, culminating in a general policy and architecture proposal for establishing node trust in wireless clusters.

[1]  Rahul Pradhan,et al.  Improved AODV Performance in DOS and Black Hole Attack Environment , 2015 .

[2]  S. Singh,et al.  Heritability and Genetic Advance Estimation From Parental Lines of Hybrid Rice , 2012 .

[3]  Li-Der Chou,et al.  A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.

[4]  Michael Kemelmakher,et al.  Preserving Mutual Interests in High Performance Computing Clusters , 1999, Informatica.

[5]  Mohammed H. Almeshekah,et al.  Defending against Password Exposure using Deceptive Covert Communication , 2015 .

[6]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[7]  Elisa Bertino,et al.  Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Levente Buttyán,et al.  Report on a working session on security in wireless ad hoc networks , 2003, MOCO.

[9]  Jonathan Loo,et al.  Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802-11 Wireless Mesh Networks , 2009, J. Digit. Content Technol. its Appl..

[10]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[11]  Kuei-Fang Hsiao,et al.  Integrating body language movements in augmented reality learning environment , 2011, Human-centric Computing and Information Sciences.

[12]  Michel Barbeau,et al.  Detecting Impersonation Attacks in Future Wireless and Mobile Networks , 2005, MADNES.

[13]  Sanjay P. Ahuja,et al.  A Survey on Wireless Grid Computing , 2006, The Journal of Supercomputing.