A Survey of Survivability in Mobile Ad Hoc Networks

被引:61
作者
Lima, Michele Nogueira [1 ]
dos Santos, Aldri Luiz [2 ]
Pujolle, Guy [1 ]
机构
[1] Univ Paris 06, LIP6, F-75016 Paris, France
[2] Univ Fed Parana, Dept Informat, BR-81531990 Curitiba, Parana, Brazil
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2009年 / 11卷 / 01期
关键词
Survivability; Intrusion Tolerance; MANETs; Security; SECURITY;
D O I
10.1109/SURV.2009.090106
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many efforts have been done towards secure MANETs, but the conventional lines of defense are still inefficient to put all attacks off. This article examines survivable approaches whose goal is to enable networks to fulfill correctly their critical functions even in the presence of attacks or intrusions. We introduce the most relevant survivable MANET initiatives where either preventive or reactive defenses are combined with tolerant ones. We classify the defense lines taking into account intrusion tolerance mechanisms and also identify properties and requirements of survivability. The initiatives are categorized in three groups: routing discovery, data transmission and key management. For each one, they are correlated in terms of requirements and properties. The survey shows that security solutions do not yet explore relevant survivability properties and have only focused on one network layer or one type of attack.
引用
收藏
页码:66 / 77
页数:12
相关论文
共 68 条
[61]  
Yang H., 2002, P ACM WORKSHOP WIREL, P11
[62]  
YANG H, 2004, AD HOC NETWORK SECUR
[63]  
YI S, 2003, P PKI RES WORKSH PKI
[64]  
Yih-Chun H., 2003, AD HOC NETW, V1, P175, DOI DOI 10.1016/S1570-8705(03)00019-2
[65]  
ZHONG S, 1987, P IEEE COMP COMM SOC, V3, P1997
[66]   Securing ad hoc networks [J].
Zhou, LD ;
Zygmunt, JH .
IEEE NETWORK, 1999, 13 (06) :24-30
[67]  
Zimmermann P.R., 1995, The Official PGP User's Guide
[68]  
MALICIOUS ACCIDENTAL