On-demand security and qos optimization in mobile ad hoc networks

Scope and method of study. Security often comes with overhead that will impact link Quality of Service (QoS) performance. In this dissertation, we propose an on-demand security and QoS optimization architecture in mobile ad hoc networks that automatically adapts network security level to changes in network topology, traffic condition, and link QoS requirements, so as to keep the security and QoS at optimum conditions. In order to achieve the overall objective, we introduce three basic frameworks: a policy based plug-in security framework, a multi-layer QoS guided routing algorithm, and a Proportional Integral Derivative (PID) feedback control based security and QoS optimization framework. The research has been evaluated with the network simulator ns-2. Finally, we propose an attack tree and state machine based security evaluation mechanism for ad hoc networks: a new security measurement metric. Findings and conclusions. Simulations have been done for small and large network sizes, low and high communication ratios, as well as low and high mobility scenarios. The simulations show that the proposed on-demand security and QoS optimization architecture can produce similar performance to non-secure QoS routing protocol under various traffic loads. It provides more secure ad hoc networks without compromising the QoS performance, especially under light and medium traffic conditions.

[1]  Giovanni Vigna,et al.  STATL: An Attack Language for State-Based Intrusion Detection , 2002, J. Comput. Secur..

[2]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[3]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[4]  Kang G. Shin,et al.  A distributed route-selection scheme for establishing real-time channels , 1995, HPN.

[5]  Ariel Orda,et al.  QoS based routing in networks with inaccurate information: theory and algorithms , 1997, Proceedings of INFOCOM '97.

[6]  Raphael Rom,et al.  Multi-path routing combined with resource reservation , 1997, Proceedings of INFOCOM '97.

[7]  Yu-Chee Tseng,et al.  Secure bootstrapping and routing in an IPv6-based ad hoc network , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[8]  H. T. Mouftah,et al.  QoS routing through alternate paths in wireless ad hoc networks , 2004, Int. J. Commun. Syst..

[9]  Kurt Jensen,et al.  Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Vol. 2, Analysis Methods , 1992 .

[10]  Klara Nahrstedt,et al.  Distributed quality-of-service routing in ad hoc networks , 1999, IEEE J. Sel. Areas Commun..

[11]  Carl E. Landwehr,et al.  Computer security , 2001, International Journal of Information Security.

[12]  Klara Nahrstedt,et al.  An overview of quality of service routing for next-generation high-speed networks: problems and solutions , 1998, IEEE Netw..

[13]  Vaduvur Bharghavan,et al.  CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE J. Sel. Areas Commun..

[14]  H. Zheng,et al.  Policy-based security management for ad hoc wireless systems , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[15]  William A. Arbaugh,et al.  Bootstrapping security associations for routing in mobile ad-hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[16]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[17]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[18]  Jain-Shing Liu,et al.  QoS routing in ad hoc wireless networks , 1999, IEEE J. Sel. Areas Commun..

[19]  Benjamin C. Kuo,et al.  AUTOMATIC CONTROL SYSTEMS , 1962, Universum:Technical sciences.

[20]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[21]  Klara Nahrstedt,et al.  On finding multi-constrained paths , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).

[22]  Ariel Orda,et al.  QoS routing in networks with uncertain parameters , 1998, IEEE/ACM Trans. Netw..

[23]  Udo W. Pooch,et al.  Cooperative security-enforcement routing in mobile ad hoc networks , 2002, 4th International Workshop on Mobile and Wireless Communications Network.

[24]  Kurt Jensen,et al.  Coloured Petri Nets , 1997, Monographs in Theoretical Computer Science An EATCS Series.

[25]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[26]  J. Redi,et al.  A brief overview of ad hoc networks: challenges and directions , 2002, IEEE Communications Magazine.

[27]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[28]  Somesh Jha,et al.  Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[29]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[30]  John Moy,et al.  OSPF Version 2 , 1998, RFC.

[31]  Chenxi Zhu,et al.  Medium Access Control and Quality-of-Service Routing for Mobile Ad Hoc Networks , 2001 .

[32]  Douglas S. Reeves,et al.  A distributed algorithm for delay-constrained unicast routing , 1997, Proceedings of INFOCOM '97.

[33]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[34]  Li-Hsing Yen,et al.  Topology-aided cross-layer fast handoff designs for IEEE 802.11/mobile IP environments , 2005, IEEE Commun. Mag..

[35]  Chenxi Zhu,et al.  QoS routing for mobile ad hoc networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[36]  Klara Nahrstedt,et al.  Predictive location-based QoS routing in mobile ad hoc networks , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[37]  Jim Alves-Foss,et al.  Assessing computer security vulnerability , 1995, OPSR.

[38]  H. T. Mouftah,et al.  QoS routing for wireless ad hoc networks: problems, algorithms, and protocols , 2005, IEEE Communications Magazine.

[39]  Michael Howard,et al.  Measuring Relative Attack Surfaces , 2005 .

[40]  Jennifer C. Hou Routing virtual circuits with timing requirements in virtual path based ATM networks , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.