Security Management for Mobile Ad Hoc Network of Networks (MANoN)

Many military research efforts have concentrated on how to allow war-fighters to take advantage of all available information within the battlefield in a rapid and flexible manner. As a result, the development of the Global Information Grid GIG was the key enabler for this process; hence, adding to the development of the mobile networking part of the GIG, the concept of the Mobile Ad hoc Network of Networks MANoN is introduced. This article proposes a novel security management algorithm achieving the three management essentials: Security Administration; Prevention and Detection; and Containment and Recovery; based on the International Telecommunication Union's recommendation M.3400 to manage securely the future of military Network-Centric Warfare NCW. The authors will employ Interval Temporal Logic ITL as a method of handling both sequential and parallel composition in flexible timely constrains, in addition, this technique will be evaluated using the Network Simulator NS-2 to provide and check whether security requirements are met in a comprehensive manner.

[1]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[2]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[3]  Stephen Hayes A standard for the OAM&P of PCS systems. , 1994, IEEE Personal Communications.

[4]  O. Kachirski,et al.  Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.

[5]  Robin Kravets,et al.  Key management for heterogeneous ad hoc wireless networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[6]  Lixia Zhang,et al.  Adaptive shared tree multicast in mobile wireless networks , 1998, IEEE GLOBECOM 1998 (Cat. NO. 98CH36250).

[7]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[8]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[9]  Raouf Boutaba,et al.  Projecting FCAPS to Active Networks , 2001, 2001 Enterprise Networking, Applications and Services Conference Proceedings.. EntNet@SUPERCOMM2001 (Cat. No.01EX543).

[10]  Mohan S. Kankanhalli,et al.  Efficient and robust key management for large mobile ad hoc networks , 2005, Comput. Networks.

[11]  Tracy Camp,et al.  MANET simulation studies: the incredibles , 2005, MOCO.

[12]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[13]  Yvo Desmedt,et al.  Man-in-the-Middle Attack , 2005, Encyclopedia of Cryptography and Security.

[14]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[15]  Jorma T. Virtamo,et al.  Random waypoint model in n-dimensional space , 2005, Oper. Res. Lett..

[16]  Marco Mamei,et al.  Applying Commonsense Reasoning to Place Identification , 2010, Int. J. Handheld Comput. Res..

[17]  Jeong Hyun Yi,et al.  On the utility of distributed cryptography in P2P and MANETs: the case of membership control , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[18]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[19]  Hussein Zedan,et al.  Security Solution for Mobile Ad Hoc Network of Networks (MANoN) , 2009, 2009 Fifth International Conference on Networking and Services.

[20]  Mohamed G. Gouda,et al.  Certificate dispersal in ad-hoc networks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[21]  Larry B. Stotts,et al.  Manet gateways: radio interoperability via the internet, not the radio , 2008, IEEE Communications Magazine.

[22]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[23]  Srdjan Capkun,et al.  Mobility helps security in ad hoc networks , 2003, MobiHoc '03.

[24]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[25]  Amitabh Mishra,et al.  Security in wireless ad hoc networks , 2003 .

[26]  Yanghee Choi,et al.  RODA: a new dynamic routing protocol using dual paths to support asymmetric links in mobile ad hoc networks , 2000, Proceedings Ninth International Conference on Computer Communications and Networks (Cat.No.00EX440).

[27]  Lifei Huang,et al.  On the scalability of IEEE 802.11 ad hoc networks , 2002, MobiHoc '02.

[28]  Srdjan Capkun,et al.  Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.

[29]  Klas Fokine Key Management in Ad Hoc Networks , 2002 .

[30]  Haiyun Luo,et al.  URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.

[31]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[32]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[33]  Hussein Zedan,et al.  Refining Interval Temporal Logic Specifications , 1997, ARTS.

[34]  Laurence B. Milstein,et al.  On Uplink Channel Estimation in WiMAX Systems , 2010, Int. J. Mob. Comput. Multim. Commun..

[35]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[36]  Chai-Keong Toh,et al.  Ad Hoc Mobile Wireless Networks , 2002 .

[37]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[38]  Suresh Singh,et al.  Power efficient MAC protocol for multihop radio networks , 1998, Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (Cat. No.98TH8361).

[39]  George C. Hadjichristofi,et al.  A framework for key management in mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[40]  Hans-Joachim Hof,et al.  A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.

[41]  David Taniar,et al.  International Journal of Mobile Computing and Multimedia Communications , 2010 .

[42]  Jie Wu,et al.  Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[43]  N. Asokan,et al.  Key agreement in ad hoc networks , 2000, Comput. Commun..

[44]  H. Zheng,et al.  Policy-based security management for ad hoc wireless systems , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[45]  Wen-Guey Tzeng,et al.  A Secure Fault-Tolerant Conference-Key Agreement Protocol , 2002, IEEE Trans. Computers.

[46]  David Taniar Encyclopedia of Mobile Computing and Commerce , 2007 .

[47]  William Stallings,et al.  Cryptography and network security , 1998 .

[48]  Azzedine Boukerche,et al.  A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks , 2008, PE-WASUN '08.

[49]  Ricardo Staciarini Puttini,et al.  A fully distributed IDS for MANET , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).

[50]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[51]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[52]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .

[53]  Pål Spilling,et al.  A survey of key management in ad hoc networks , 2006, IEEE Communications Surveys & Tutorials.

[54]  Raghupathy Sivakumar,et al.  Performance comparison of cellular and multi-hop wireless networks: a quantitative study , 2001, SIGMETRICS '01.

[55]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.

[56]  Yang Xiao,et al.  Integration of mobility and intrusion detection for wireless ad hoc networks , 2007, Int. J. Commun. Syst..

[57]  Fei Xing,et al.  Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[58]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[59]  R. Dorf,et al.  The handbook of ad hoc wireless networks , 2003 .

[60]  J.D. Smith,et al.  Attributes of Effective Configuration Management For Systems of Systems , 2008, 2008 2nd Annual IEEE Systems Conference.

[61]  Robin Kravets,et al.  MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .

[62]  Bruce Tuch,et al.  Development of WaveLAN®, an ISM band wireless LAN , 1993, AT&T Technical Journal.

[63]  Praphul Chandra BULLETPROOF WIRELESS SECURITY: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering) , 2005 .

[64]  Partha Dasgupta,et al.  Trusting routers and relays in ad hoc networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[65]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[66]  Shari Lawrence Pfleeger,et al.  Insiders Behaving Badly , 2008, IEEE Security & Privacy.

[67]  Mario Gerla,et al.  TCP performance in wireless multi-hop networks , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[68]  Panagiotis Papadimitratos,et al.  Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.

[69]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[70]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[71]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[72]  Moti Yung,et al.  Proactive RSA , 1997, CRYPTO.

[73]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[74]  Seong Keun Oh,et al.  Cognitive Ad-hoc Networks under a Cellular Network with an Interference Temperature Limit , 2008, 2008 10th International Conference on Advanced Communication Technology.

[75]  Stefano Basagni,et al.  Secure pebblenets , 2001, MobiHoc '01.

[76]  Michael R. Lyu,et al.  Trust- and clustering-based authentication services in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[77]  Emmanuel Agu,et al.  UbiWave: A Novel Energy-Efficient End-to-End Solution for Mobile 3D Graphics , 2010 .

[78]  Srdjan Capkun,et al.  Mobility helps peer-to-peer security , 2006, IEEE Transactions on Mobile Computing.

[79]  Vasos Vassiliou,et al.  MARCH: a medium access control protocol for multihop wireless ad hoc networks , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).

[80]  A. Fioretti,et al.  An OSI compatible architecture for integrated multichannel metropolitan and regional networks , 1989, Proceedings. Electrotechnical Conference Integrating Research, Industry and Education in Energy and Communication Engineering',.

[81]  Norman M. Abramson,et al.  Development of the ALOHANET , 1985, IEEE Trans. Inf. Theory.

[82]  Wen-Chen Hu,et al.  Handheld Computing for Mobile Commerce: Applications, Concepts and Technologies , 2010 .

[83]  Srdjan Capkun,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[84]  Yu-Fang Chung,et al.  Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[85]  Linda Doyle,et al.  Ad hoc key management infrastructure , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[86]  Arun Prakash,et al.  Improving Throughput of Starved TCP Flow by Sidestepping Bottleneck Nodes Using Concurrent Transmission , 2010, Int. J. Mob. Comput. Multim. Commun..

[87]  Liviu Iftode,et al.  Locality driven key management architecture for mobile ad-hoc networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[88]  Chunming Qiao,et al.  Integrated cellular and ad hoc relaying systems: iCAR , 2001, IEEE J. Sel. Areas Commun..

[89]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[90]  N. Raghavendra Rao Mobile Computing - An Enabler in International Financial Services , 2006 .

[91]  Nitin H. Vaidya,et al.  Impact of routing and link layers on TCP performance in mobile ad hoc networks , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).

[92]  Haiyun Luo,et al.  Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .

[93]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[94]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[95]  Chai-Keong Toh Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks , 2001 .

[96]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.