Escolar Documentos
Profissional Documentos
Cultura Documentos
Abstract
1.0
Introduction
Mobile Ad Hoc Networks (MANETs) deploy with the rapid proliferation of wireless
lightweight devices such as laptops, PDAs, wireless telephones, and wireless sensors. They
have
been
used
in
applications
such
as
survivable,
dynamic
communication
for
emergency/rescue operations, disaster relief efforts, and military networks. These applications
demand high security protection where any security weaknesses identified needed to be
addressed appropriately. Many security mechanisms developed for wired network cannot be
applied directly to MANETs due to their self-constructed infrastructure [1]. In MANETs, the
nodes are mobile. As a result, the network topology may change rapidly and unpredictably over
time. Furthermore, the network is decentralized; where all network activity including discovering
the topology and delivering messages must be executed by the nodes themselves.
Security problem in MANETs from the security design perspective is the lack of a clear
line of defense. Most of the security solutions proposed in Manets cover preventive and reactive
solution [ ]. Preventive and reactive mechanism only specialized to one network layer, protocol
or attack. According to [ ], in order to achieve optimum security protection, additional level of
defense should be placed when designing security framework, which is intrusion tolerance (IT).
Intrusion tolerance plays a role to complement security hole in Manets. Its goal is to make
systems tolerant to attacks and intruders, which are to afford some essential network services in
the presence of malicious attacks. Furthermore, the combination of these three lines of defense
will achieve survivability requirements in Manets.
Problem statements
Many security researches in Manets only combine with prevention and reaction
mechanism. This approach is known as cross layer approach. In this approach, prevention
mechanism work to avoid any type of attacks such as firewall and cryptographic system [ ], and
reaction mechanism will take action to mitigate the intrusion via Intrusion Detection System
(IDS). Although the prevention mechanism will be the fit to defense the attacks, however, some
attack may be succeeded entering the network. Thus, the reaction mechanism will begin to
work by detecting and stopping the attack. This approach would not guarantee the network
operation in the presence of attacks. It needs a mechanism of intrusion tolerance to afford some
essential network services in the presence of attacks.
Literature review
identify the legitimate nodes. On the other hand, reactive is to take action on demand to
mitigate intrusion, as intrusion detection systems (IDS). Nevertheless, preventive and
solution are not efficient to handle all attacks and intrusion. Thus, the third defense line
which is tolerance should be included in designing new security framework. These three
lines of defense need to be incorporated to fully survive the networks in Manets [ ].
It provides
multiple level of detection across different layer of protocol stacks. However, this
approach only covers up to two level of defense. Intrusion tolerant is important
whenever nodes need to back up in services in the presence of malicious attacks.
Lei Guang and Chadi Assi [ ] also proposed cross layer security design between
routing and MAC layer. The approach is to mitigate certain interlayer attacks. These two
layer attacks work together to facilitate detection and reaction against node MAC
misbehavior in Manets. At the end the trust list based on the detection information
obtained at MAC layer were build. Their work also tackle up to two layers of defense.