Weitere Artikel dieser Ausgabe durch Wischen aufrufen
The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject to some unique security issues. In particular, one of the most vexing problem for MANETs security is the node capture attack: an adversary can capture a node from the network eventually acquiring all the cryptographic material stored in it. Further, the captured node can be reprogrammed by the adversary and redeployed in the network in order to perform malicious activities. In this paper, we address the node capture attack in MANETs. We start from the intuition that mobility, in conjunction with a reduced amount of local cooperation, helps computing effectively and with a limited resource usage network global security properties. Then, we develop this intuition and use it to design a mechanism to detect the node capture attack. We support our proposal with a wide set of experiments showing that mobile networks can leverage mobility to compute global security properties, like node capture detection, with a small overhead.
Chan H, Perrig A, Song D: Random key predistribution schemes for sensor networks. Proceedings of the IEEE Symposium on Security and Privacy (S&P '03), September 2003
Newsome J, Shi E, Song D, Perrig A: The sybil attack in sensor networks: analysis & defenses. Proceedings of the 3rd International Conference on Information Processing in Sensor Networks (IPSN '04), April 2004
Demirbas M, Song Y: An RSSI-based scheme for sybil attack detection in wireless sensor networks. Proceedings of the International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM '06), June 2006, New York, NY, USA 564-568.
Di Pietro R, Mancini LV, Mei A: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks 2006, 12(6):709-721. 10.1007/s11276-006-6530-5 CrossRef
Conti M, Di Pietro R, Mancini LV, Mei A: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '07), 2007 80-89. CrossRef
Parno B, Perrig A, Gligor VD: Distributed detection of node replication attacks in sensor networks. Proceedings of the IEEE Symposium on Security and Privacy (S&P '05), 2005
Information Processing Technology Office (IPTO) Defense Advanced Research Projects Agency (DARPA) BAA 07-46 LANdroids Broad Agency Announcement, 2007, http://www.darpa.mil/index.html
Perrig A, Stankovic J, Wagner D: Security in wireless sensor networks. Commununications of ACM 2004, 47(6):53-57. 10.1145/990680.990707 CrossRef
Capkun S, Hubaux J-P, Buttyán L: Mobility helps security in ad hoc networks. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '03), 2003 46-56. CrossRef
Piro C, Shields C, Levine BN: Detecting the sybil attack in mobile ad hoc networks. Proceedings of the 2nd International Conference on Security and Privacy in Communication Networks (SecureComm '06), 2006, Baltimore, Md, USA
Broch J, Maltz DA, Johnson DB, Hu Y-C, Jetcheva J: A performance comparison of multi-hop wireless ad hoc network routing protocols. Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '98), 1998 85-79. CrossRef
Sharma G, Mazumdar R, Shroff NB: Delay and capacity trade-offs in mobile ad hoc networks: a global perspective. Proceedings of the 25th Conference on Computer Communications (INFOCOM '06), 2006
Becher A, Becher E, Benenson Z, Dornseif M: Tampering with motes: real-world physical attacks on wireless sensor networks. Proceeding of the 3rd International Conference on Security in Pervasive Computing (SPC '06), 2006 104-118.
Grossglauser M, Vetterli M: Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '03), 2003, San Francisco, Calif, USA
Luo J, Hubaux J-P: Joint mobility and routing for lifetime elongation in wireless sensor networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), March 2005, Miami, Fla, USA
fan Hsin C, Liu M: A distributed monitoring mechanism for wireless sensor networks. Proceedings of the Workshop on Wireless Security (WiSe '02), 2002 57-66. CrossRef
fan Hsin C, Liu M: Self-monitoring of wireless sensor networks. Computer Communications 2006, 29(4):462-476. 10.1016/j.comcom.2004.12.031 CrossRef
Hayashibara N, Cherif A, Katayama T: Failure detectors for large-scale distributed systems. Proceedings of the 21st IEEE Symposium on Reliable Distributed Systems (SRDS '02), October 2002, Suita, Japan
Ranganathan S, George AD, Todd RW, Chidester MC: Gossip-style failure detection and distributed consensus for scalable heterogeneous clusters. Cluster Computing 2001, 4(3):197-209. 10.1023/A:1011494323443 CrossRef
Curtmola R, Kamara S: A mechanism for communication-efficient broadcast encryption over wireless ad hoc networks. Electronic Notes in Theoretical Computer Science 2007, 171(1):57-69. 10.1016/j.entcs.2006.11.009 CrossRef
Huang D, Mehta M, Medhi D, Harn L: Location-aware key management scheme for wireless sensor networks. Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), November 2004, Washington, DC, USA 29-42. CrossRef
Tague P, Poovendran R: Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Network 2007, 5(6):801-814. 10.1016/j.adhoc.2007.01.002 CrossRef
Tague P, Slater D, Rogers J, Poovendran R: Vulnerability of network traffic under node capture attacks using circuit theoretic analysis. Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM '08), 2008 161-165.
Conti M, Di Pietro R, Gabrielli A, Mancini LV, Mei A: The quest for mobility models to analyse security in mobile ad hoc networks. Proceedings of the 7th International Conference on Wired/Wireless Internet Communications (WWIC '09), May 2009 85-96.
Conti M, Di Pietro R, Mancini LV, Mei A: Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec '08), 2008 214-219. CrossRef
Daly EM, Haahr M: Social network analysis for routing in disconnected delay-tolerant MANETs. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '07), September 2007 32-40. CrossRef
Sterbenz JPG, Krishnan R, Hain RR, et al.: Survivable mobile wireless networks: issues, challenges, and research directions. Proceedings of the 1st ACM Workshop on Wireless Security (WiSe '02), 2002, Atlanta, Ga, USA 31-40. CrossRef
Di Pietro R, Mancini L, Soriente C, Spognardi A, Tsudik G: Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Ad Hoc Networks 2009, 7(8):1463-1475. 10.1016/j.adhoc.2009.04.002 CrossRef
Yoon J, Liu M, Noble B: Random waypoint considered harmful. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, March 2003, San Franciso, Calif, USA 2: 1312-1321.
Hyytiä E, Lassila P, Virtamo J: Spatial node distribution of the random waypoint mobility model with applications. IEEE Transactions on Mobile Computing 2006, 5(6):680-694. CrossRef
Sun K, Ning P, Wang C: Fault-tolerant cluster-wise clock synchronization for wireless sensor networks. IEEE Transactions on Dependable and Secure Computing 2005, 2(3):177-189. 10.1109/TDSC.2005.36 CrossRef
Williams B, Camp T: Comparison of broadcasting techniques for mobile ad hoc networks. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '02), 2002 194-205. CrossRef
Orecchia L, Panconesi A, Petrioli C, Vitaletti A: Localized techniques for broadcasting in wireless sensor networks. Proceedings of the Joint Workshop on Foundations of Mobile Computing (DIALM-POMC '04), October 2004, Philadelphia, Pa, USA
Burns B, Brock O, Levine BN: MORA routing and capacity building in disruption-tolerant networks. Ad Hoc Networks 2008, 6(4):600-620. 10.1016/j.adhoc.2007.05.002 CrossRef
Liu H, Wan P-J, Liu X, Yao F: A distributed and efficient flooding scheme using 1-hop information in mobile ad hoc networks. IEEE Transactions on Parallel and Distributed Systems 2007, 18(5):658-671. CrossRef
Rahman SMM, Nasser N, Inomata A, Okamoto T, Mambo M, Okamoto E: Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks. Security and Communication Networks 2008, 1(2):179-189. 10.1002/sec.4 CrossRef
Striki M, Baras J, Manousakis K: A robust, distributed TGDH-based scheme for secure group communications in MANET. Proceedings of the IEEE International Conference on Communications (ICC '04), May 2004
Di Pietro R, Mancini LV, Mei A: Efficient and resilient key discovery based on pseudo-random key pre-deployment. Proceedings of the IEEE International Parallel and Distributed Processing Symposium (IPDPS '04), 2004 2991-2998.
Wander A, Gura N, Eberle H, Gupta V, Shantz SC: Energy analysis of public-key cryptography for wireless sensor networks. Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW '05), 2005
Bandyopadhyay S, Coyle EJ, Falck T: Stochastic properties of mobility models in mobile ad hoc networks. IEEE Transactions on Mobile Computing 2007, 6(11):1218-1229. CrossRef
Chaintreau A, Hui P, Diot C, Gass R, Scott J: Impact of human mobility on opportunistic forwarding algorithms. IEEE Transactions on Mobile Computing 2007, 6(6):606-620. CrossRef
- Mobility and Cooperation to Thwart Node Capture Attacks in MANETs
Roberto Di Pietro
Luigi V. Mancini
- Springer International Publishing
EURASIP Journal on Wireless Communications and Networking
Elektronische ISSN: 1687-1499
Neuer Inhalt/© ITandMEDIA, Best Practices für die Mitarbeiter-Partizipation in der Produktentwicklung/© astrosystem | stock.adobe.com