Data Security in MANETs using Multipath Routing and Directional Transmission

A cross-layer approach is investigated to improve data security in Mobile Ad Hoc Networks (MANETs). The use of directional antennas and intelligent multipath routing is proposed to enhance end-to-end data confidentiality and data availability with respect to outsider attacks. The goal is to impede rogue attempts to gain unauthorized access to classified information or disrupt the information flow. The interplay between the physical, link, and network layers is considered. A novel simulator is developed to accurately quantify the data confidentiality benefits of these approaches. This study leverages the existence of multiple paths between end-nodes to statistically improve data confidentiality and data availability in hostile MANET environments, where both insider and outsider adversaries may be present. Simulation results show that the proposed mechanisms can greatly improve data confidentiality as compared to existing schemes. These mechanisms can also improve data availability.

[1]  Symeon Papavassiliou,et al.  Improving network security by multipath traffic dispersion , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[2]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[3]  Ram Ramanathan,et al.  On the performance of ad hoc networks with beamforming antennas , 2001, MobiHoc '01.

[4]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[5]  Dipak Ghosal,et al.  Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges , 2003, MASCOTS Tutorials.

[6]  Samir R. Das,et al.  On-demand multipath routing for mobile ad hoc networks , 1999, Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370).

[7]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[8]  Yuguang Fang,et al.  SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[9]  Nj Piscataway,et al.  Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .

[10]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[11]  Satish K. Tripathi,et al.  A framework for reliable routing in mobile ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[12]  Guevara Noubir,et al.  Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.

[13]  Guevara Noubir,et al.  On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility , 2004, WWIC.

[14]  Mike Burmester,et al.  Secure multipath communication in mobile ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[15]  Nitin H. Vaidya,et al.  On designing MAC protocols for wireless networks using directional antennas , 2006, IEEE Transactions on Mobile Computing.

[16]  Laurie G. Cuthbert,et al.  A reliable node-disjoint multipath routing with low overhead in wireless ad hoc networks , 2004, MSWiM '04.

[17]  Xin Liu,et al.  Transmission power control for ad hoc wireless networks: throughput, energy and fairness , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[18]  Panagiotis Papadimitratos,et al.  Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.

[19]  Cauligi S. Raghavendra,et al.  Energy efficient communications in ad hoc networks using directional antennas , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[20]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[21]  Dipak Ghosal,et al.  Analysis of a distributed algorithm to determine multiple routes with path diversity in ad hoc networks , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[22]  Sunil Kumar,et al.  Medium Access Control protocols for ad hoc wireless networks: A survey , 2006, Ad Hoc Networks.

[23]  Yuguang Fang,et al.  A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions , 2004 .

[24]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[25]  TRANSPORT LAYER AND SECURITY PROTOCOLS FOR AD HOC WIRELESS NETWORKS , 2004 .

[26]  Sung-Ju Lee,et al.  Transmission power control in wireless ad hoc networks: challenges, solutions and open issues , 2004, IEEE Network.

[27]  Abtin Keshavarzian,et al.  Load balancing in ad hoc networks: single-path routing vs. multi-path routing , 2004, IEEE INFOCOM 2004.

[28]  Jalel Ben-Othman,et al.  Data security in ad hoc networks using multipath routing , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[29]  Vaduvur Bharghavan,et al.  Transmission power control for multiple access wireless packet networks , 2000, Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000.