Aggregation of Information Leaked by a MANET

Use of a MANET system will inevitably leak information into the operational environment. An adversary can gain and aggregate information from physical sightings, detection of radio signals and eavesdropping, acquisition of node equipment and detection of patterns of system use and response. This paper investigates the information aggregation threat, viewed as a driver of MANET security design. A security assessment method is sketched, involving an abstract ‘information layer’ that bridges between operational scenarios/ vignettes and MANET system and operation design. The approach focuses on the value of information to the adversary. Recommendations are made for further development.