Mobility and Cooperation to Thwart Node Capture Attacks in MANETs

被引:25
作者
Conti, Mauro [1 ]
Di Pietro, Roberto [2 ,3 ]
Mancini, Luigi V. [4 ]
Mei, Alessandro [4 ]
机构
[1] Vrije Univ Amsterdam, Dept Comp Sci, NL-1081 HV Amsterdam, Netherlands
[2] Univ Rovira & Virgili, UNESCO Chair Data Privacy, Tarragona 43700, Spain
[3] Univ Roma Tre, Dipartimento Matemat, I-00146 Rome, Italy
[4] Univ Roma La Sapienza, Dipartimento Informat, I-00198 Rome, Italy
关键词
WIRELESS; AUTHENTICATION;
D O I
10.1155/2009/945943
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The nature of mobile ad hoc networks (MANETs), often unattended, makes this type of networks subject to some unique security issues. In particular, one of the most vexing problem for MANETs security is the node capture attack: an adversary can capture a node from the network eventually acquiring all the cryptographic material stored in it. Further, the captured node can be reprogrammed by the adversary and redeployed in the network in order to perform malicious activities. In this paper, we address the node capture attack in MANETs. We start from the intuition that mobility, in conjunction with a reduced amount of local cooperation, helps computing effectively and with a limited resource usage network global security properties. Then, we develop this intuition and use it to design a mechanism to detect the node capture attack. We support our proposal with a wide set of experiments showing that mobile networks can leverage mobility to compute global security properties, like node capture detection, with a small overhead. Copyright (C) 2009 Mauro Conti et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
引用
收藏
页数:13
相关论文
共 42 条
[1]  
[Anonymous], 2002, Proceedings of the 1st ACM workshop on Wireless security, DOI DOI 10.1145/570681.570685
[2]   Stochastic properties of mobility models in mobile ad hoc networks [J].
Bandyopadhyay, Seema ;
Coyle, Edward J. ;
Falck, Tillmann .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2007, 6 (11) :1218-1229
[3]  
Becher A, 2006, LECT NOTES COMPUT SC, V3934, P104
[4]  
Broch J., 1998, MobiCom'98. Proceedings of Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, P85, DOI 10.1145/288235.288256
[5]   MORA routing and capacity building in disruption-tolerant networks [J].
Bums, Brendan ;
Brock, Oliver ;
Levine, Brian Neil .
AD HOC NETWORKS, 2008, 6 (04) :600-620
[6]  
Capkun Srdjan., 2003, MOBIHOC 03 P 4 ACM I, P46
[7]   Impact of human mobility on opportunistic forwarding algorithms [J].
Chaintreau, Augustin ;
Hui, Pan ;
Crowcroft, Jon ;
Diot, Christophe ;
Gass, Richard ;
Scott, James .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2007, 6 (06) :606-620
[8]  
CHAN H, 2003, P IEEE S SEC PRIV S
[9]  
CONTI M, 2009, P 7 INT C WIR WIR IN, P85
[10]  
Conti M, 2008, WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P214