The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks

Mobile Ad Hoc networks are subject to some unique security issues that could delay their diffusion. Several solutions have already been proposed to enforce specific security properties. However, mobility pattern nodes obey to can, on one hand, severely affect the quality of the security solutions that have been tested over "synthesized" mobility pattern. On the other hand, specific mobility patterns could be leveraged to design specific protocols that could outperform existing solutions. In this work, we investigate the influence of a realistic mobility scenario over a benchmark mobility model (Random Waypoint Mobility Model), using as underlying protocol a recent solution introduced for the detection of compromised nodes. Extensive simulations show the quality of the underlying protocol. However, the main contribution is to show the relevance of the mobility model over the achieved performances, stressing out that in mobile ad-hoc networks the quality of the solution provided is satisfactory only when it can be adapted to the nodes underlying mobility model.

[1]  Ness B. Shroff,et al.  Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[2]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[3]  Roberto Di Pietro,et al.  A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks , 2007, MobiHoc '07.

[4]  Stephan Olariu,et al.  A two-zone hybrid routing protocol for mobile ad hoc networks , 2004, IEEE Transactions on Parallel and Distributed Systems.

[5]  Roberto Di Pietro,et al.  Emergent properties: detection of the node-capture attack in mobile wireless sensor networks , 2008, WiSec '08.

[6]  Naohiro Hayashibara,et al.  Failure detectors for large-scale distributed systems , 2002, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings..

[7]  Reza Curtmola,et al.  A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks , 2007, Electron. Notes Theor. Comput. Sci..

[8]  Christian Bettstetter Topology properties of Ad hoc networks with random waypoint mobility , 2003, MOCO.

[9]  Jun Luo,et al.  Joint mobility and routing for lifetime elongation in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[10]  Christophe Diot,et al.  CRAWDAD dataset cambridge/haggle (v.2006-01-31) , 2006 .

[11]  Brian Neil Levine,et al.  Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.

[12]  Jorma T. Virtamo,et al.  Spatial node distribution of the random waypoint mobility model with applications , 2006, IEEE Transactions on Mobile Computing.

[13]  Pan Hui,et al.  CRAWDAD dataset cambridge/haggle (v.2009-05-29) , 2009 .

[14]  Sushil Jajodia,et al.  Securing Topology Maintenance Protocols for Sensor Networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[15]  John S. Baras,et al.  A Robust, Distributed TGDH-based Scheme for Secure Group Communications in MANET , 2006, 2006 IEEE International Conference on Communications.

[16]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[17]  Hai Liu,et al.  A Distributed and Efficient Flooding Scheme Using 1-Hop Information in Mobile Ad Hoc Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.

[18]  Roberto Di Pietro,et al.  Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks , 2006, Wirel. Networks.

[19]  Julinda Stefa,et al.  SWIM: A Simple Model to Generate Small Mobile Worlds , 2008, IEEE INFOCOM 2009.

[20]  E. Coyle,et al.  Stochastic Properties of Mobility Models in Mobile Ad Hoc Networks , 2006 .

[21]  Srdjan Capkun,et al.  Mobility helps security in ad hoc networks , 2003, MobiHoc '03.

[22]  Martin Vetterli,et al.  Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[23]  Sushil Jajodia,et al.  Securing Topology Maintenance Protocols for Sensor Networks: Attacks and Countermeasures , 2005 .

[24]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[25]  Mingyan Liu,et al.  Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).