Security Topics and Mobility Management in Hierarchical Ad Hoc Networks (Samoyed): Final Report

This report presents a summary of the technical results of project SAMOYED (2003–2006). This three-year research project considered topics in hierarchical ad hoc networks, especially ad hoc access networks, with a focus on mobility management and security issues. Results of the project include techniques for establishing and maintaining connectivity in ad hoc access networks; a novel method for dynamic local clustering and cluster-based routing in ad hoc networks; and requirements analysis and design of security architectures for clustered ad hoc networks. This report consists of a general overview of the topics studied in the project, and reprints of five of the project’s publications.

[1]  G. Sicuranza,et al.  The landmark hierarchy: A new hierarchy for routing in very large networks , 1988 .

[2]  Uta Wille,et al.  Communication complexity of group key distribution , 1998, CCS '98.

[3]  Pekka Nikander,et al.  BLIND: A Complete Identity Protection Framework for End-Points , 2004, Security Protocols Workshop.

[4]  Gene Tsudik,et al.  Simple and fault-tolerant key agreement for dynamic collaborative groups , 2000, CCS.

[5]  Hans-Joachim Hof,et al.  A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.

[6]  Charles E. Perkins,et al.  Ad Hoc Networking , 2001 .

[7]  P. Nikander,et al.  Applying host identity protocol to tactical networks , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..

[8]  Antoine Joux,et al.  A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.

[9]  Martha Steenstrup,et al.  Cluster-based networks , 2001 .

[10]  Qun Li,et al.  Online power-aware routing in wireless Ad-hoc networks , 2001, MobiCom '01.

[11]  Anthony Ephremides,et al.  A Distributed Algorithm for Organizing Mobile Radio Telecommunication Networks , 1981, IEEE International Conference on Distributed Computing Systems.

[12]  W. Hamilton,et al.  The Evolution of Cooperation , 1984 .

[13]  Jean-Jacques Quisquater,et al.  Generic insecurity of cliques-type authenticated group key agreement protocols , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..

[14]  Christos Gkantsidis,et al.  On the Semantics of Internet topologies , 2002 .

[15]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[16]  Markus Jakobsson,et al.  A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks , 2003, Financial Cryptography.

[17]  Ram Ramanathan,et al.  Hierarchically‐organized, multihop mobile wireless networks for quality‐of‐service support , 1998, Mob. Networks Appl..

[18]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[19]  Wilson Vicente Ruggiero,et al.  A Trust-Based Security Architecture for Small and Medium-Sized Mobile Ad Hoc Networks , 2004 .

[20]  A. Ephremides,et al.  A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.

[21]  Ram Ramanathan,et al.  Making link-state routing scale for ad hoc networks , 2001, MobiHoc '01.

[22]  Ivan Marsic,et al.  Clustering overhead for hierarchical routing in mobile ad hoc networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[23]  Hongqiang Zhai,et al.  Reliable and efficient packet forwarding by utilizing path diversity in wireless ad hoc networks , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..

[24]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[25]  Panagiotis Papadimitratos,et al.  Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.

[26]  RamanathanRam,et al.  Hierarchically-organized, multihop mobile wireless networks for quality-of-service support , 1998 .

[27]  Scott Shenker,et al.  Geographic routing without location information , 2003, MobiCom '03.

[28]  Dhiraj K. Pradhan,et al.  A cluster-based approach for routing in dynamic networks , 1997, CCRV.

[29]  John S. Baras,et al.  Modeling key agreement in multi-hop ad hoc networks , 2006, IWCMC '06.

[30]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[31]  Eitan Altman,et al.  Non-cooperative Forwarding in Ad-Hoc Networks , 2005, NETWORKING.

[32]  W. Hamilton,et al.  The evolution of cooperation. , 1984, Science.

[33]  Pekka Nikander,et al.  Delegation of Signalling Rights , 2002, Security Protocols Workshop.

[34]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[35]  Zygmunt J. Haas,et al.  A new routing protocol for the reconfigurable wireless networks , 1997, Proceedings of ICUPC 97 - 6th International Conference on Universal Personal Communications.

[36]  Stefan Schlott,et al.  Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks , 2004, ESAS.

[37]  Xiaoyan Hong,et al.  LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[38]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[39]  Xiaoyan Hong,et al.  Scalable routing protocols for mobile ad hoc networks , 2002, IEEE Netw..

[40]  Jennifer Bray,et al.  Bluetooth: Connect Without Cables , 2000 .

[41]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[42]  Satu Elisa Schaeffer,et al.  Stochastic Local Clustering for Massive Graphs , 2005, PAKDD.

[43]  Samir Khuller,et al.  A clustering scheme for hierarchical control in multi-hop wireless networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[44]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[45]  Gregory S. Lauer,et al.  Hierarchical Routing Design for Suran , 1986, International Conference on Intelligent Cloud Computing.

[46]  Ryuji Wakikawa,et al.  Global connectivity for IPv6 Mobile Ad Hoc Networks , 2006 .

[47]  Farouk Kamoun,et al.  Stochastic Performance Evaluation of Hierarchical Routing for Large Networks , 1979, Comput. Networks.

[48]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[49]  Shouhuai Xu,et al.  LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[50]  Xiang-Yang Li,et al.  Regional gossip routing for wireless ad hoc networks , 2003, 28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings..

[51]  Atsushi Iwata,et al.  Scalable routing strategies for ad hoc wireless networks , 1999, IEEE J. Sel. Areas Commun..

[52]  Robert H. Deng,et al.  Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient , 2003, ACNS.

[53]  Prithwish Basu,et al.  A mobility based metric for clustering in mobile ad hoc networks , 2001, Proceedings 21st International Conference on Distributed Computing Systems Workshops.

[54]  Zygmunt J. Haas,et al.  The Interzone Routing Protocol (IERP) for Ad Hoc Networks , 2002 .

[55]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.

[56]  Bharat K. Bhargava,et al.  On security study of two distance vector routing protocols for mobile ad hoc networks , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[57]  Teemu Koponen,et al.  Resilient Connections for SSH and TLS , 2006, USENIX Annual Technical Conference, General Track.

[58]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[59]  Yu-Chee Tseng,et al.  A Two-Tier Heterogeneous Mobile Ad Hoc Network Architecture and Its Load-Balance Routing Problem , 2004, Mob. Networks Appl..

[60]  Mario Gerla,et al.  Fisheye state routing: a routing scheme for ad hoc wireless networks , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.

[61]  Zhang Ya-juan,et al.  An identity-based key-exchange protocol , 2008, Wuhan University Journal of Natural Sciences.

[62]  Frank Harary,et al.  Graph Theory , 2016 .

[63]  Levente Buttyán,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.

[64]  Tomoyuki Ohta,et al.  An adaptive multihop clustering scheme for highly mobile ad hoc networks , 2003, The Sixth International Symposium on Autonomous Decentralized Systems, 2003. ISADS 2003..

[65]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[66]  Azer Bestavros,et al.  Small-World Internet Topologies: Possible Causes and Implications on Scalability of End-System Multicast , 2002 .

[67]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[68]  Vikram Srinivasan,et al.  Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[69]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[70]  Maarit Hietalahti A Clustering-based Group Key Agreement Protocol for Ad-Hoc Networks , 2008, Electron. Notes Theor. Comput. Sci..

[71]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[72]  Tzu-Jane Tsai,et al.  A access-based clustering protocol for multihop wireless ad hoc networks , 2001, IEEE J. Sel. Areas Commun..

[73]  Mario Gerla,et al.  Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..

[74]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[75]  Maarit Hietalahti Key Establishment in Ad-hoc Networks , 2001 .

[76]  Charles E. Perkins,et al.  IP Mobility Support , 1996, RFC.

[77]  Evangelos Kranakis,et al.  S-RIP: A Secure Distance Vector Routing Protocol , 2004, ACNS.

[78]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[79]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[80]  C. Siva Ram Murthy,et al.  MuSeQoR: Multi-path failure-tolerant security-aware QoS routing in Ad hoc wireless networks , 2006, Comput. Networks.

[81]  Kwangjo Kim,et al.  An Efficient Tree-Based Group Key Agreement Using Bilinear Map , 2003, ACNS.

[82]  Jean-Pierre Hubaux,et al.  Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .

[83]  Satu Elisa Schaeffer,et al.  Dynamic Local Clustering for Hierarchical Ad Hoc Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[84]  Gene Tsudik,et al.  A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks , 2005, J. Inf. Sci. Eng..

[85]  Maarit Hietalahti Efficient Key Agreement for Ad-hoc Networks , 2001 .

[86]  Pietro Lungaro Cost/Performance Trade-offs of "Two-Layers" Ad Hoc Multihop Cellular Access Systems , 2004 .

[87]  Yvo Desmedt,et al.  Threshold cryptography , 1994, Eur. Trans. Telecommun..

[88]  BlazevicL.,et al.  Self organization in mobile ad hoc networks , 2001 .

[89]  Xiaoyan Hong,et al.  LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility , 1988, MobiHoc.

[90]  Farouk Kamoun,et al.  Hierarchical Routing for Large Networks; Performance Evaluation and Optimization , 1977, Comput. Networks.

[91]  Pekka Nikander,et al.  Local clustering for hierarchical ad hoc networks , 2004 .

[92]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[93]  Mario Gerla,et al.  Multicluster, mobile, multimedia radio network , 1995, Wirel. Networks.

[94]  Timothy J. Shepard Some Thoughts on HIP Rendezvous , 2004 .

[95]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[96]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[97]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[98]  Yanghee Choi,et al.  K-hop cluster-based dynamic source routing in wireless ad-hoc packet radio network , 1998, VTC '98. 48th IEEE Vehicular Technology Conference. Pathway to Global Wireless Revolution (Cat. No.98CH36151).

[99]  Ricardo Staciarini Puttini,et al.  Combining Certification-based Authentication and Intrusion Detection to Secure Manet Routing Protocols , 2004 .

[100]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[101]  Dirk Westhoff,et al.  Estimating the value of co-operation approaches for multi-hop ad hoc networks , 2005, Ad Hoc Networks.

[102]  Patrick Horster,et al.  Self-certified keys — Concepts and Applications , 1997 .

[103]  Anthony Ephremides,et al.  The Architectural Organization of a Mobile Radio Network via a Distributed Algorithm , 1981, IEEE Trans. Commun..

[104]  Songwu Lu,et al.  Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.

[105]  Xiang-Yang Li,et al.  Efficient hybrid key agreement protocol for wireless ad hoc networks , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.

[106]  Xiaoyan Hong,et al.  Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).

[107]  Yih-Chun Hu,et al.  Wormhole Detection in Wireless Ad Hoc Networks , 2002 .

[108]  C C. Chiang,et al.  Routing in Clustered Multihop, Mobile Wireless Networks With Fading Channel , 1997 .

[109]  Jalel Ben-Othman,et al.  Data security in ad hoc networks using multipath routing , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[110]  Haiyun Luo,et al.  URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.

[111]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[112]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[113]  Xiaoyan Hong,et al.  A wireless hierarchical routing protocol with group mobility , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).

[114]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[115]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[116]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[117]  Carl M. Ellison,et al.  SPKI Requirements , 1999, RFC.

[118]  G Németh,et al.  Giant clusters in random ad hoc networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[119]  Jon Kleinberg,et al.  The Structure of the Web , 2001, Science.

[120]  Felix C. Gaertner,et al.  A Survey of Self-Stabilizing Spanning-Tree Construction Algorithms , 2003 .

[121]  Charles E. Perkins,et al.  Mobility support in IPv6 , 1996, MobiCom '96.

[122]  Gabriel Montenegro,et al.  Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.

[123]  Srdjan Capkun,et al.  Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.

[124]  Srdjan Capkun,et al.  Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..

[125]  Silvia Giordano,et al.  Modelling cooperation in mobile ad hoc networks: a formal description of selfishness , 2003 .

[126]  Stefano Basagni,et al.  Distributed clustering for ad hoc networks , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).

[127]  George Kesidis,et al.  Secure routing in ad hoc networks and a related intrusion detection problem , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..