Ita Conference Paper - Aggregation of Information Leaked by a Manet

نویسندگان

  • John Murdoch
  • John A. Clark
  • John A. McDermid
  • R. Chivers
چکیده

Use of a MANET system will inevitably leak information into the operational environment. An adversary can gain and aggregate information from physical sightings, detection of radio signals and eavesdropping, acquisition of node equipment and detection of patterns of system use and response. This paper investigates the information aggregation threat, viewed as a driver of MANET security design. A security assessment method is sketched, involving an abstract ‘information layer’ that bridges between operational scenarios/ vignettes and MANET system and operation design. The approach focuses on the value of information to the adversary. Recommendations are made for further development.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR

Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...

متن کامل

A New Method to Reduce Energy Consumption in Manet Network Routing based on OLSR Protocol and Genetic Algorithm

Mobile Ad Hoc Networks (MANET) can be considered as a class of unstructured networks created by a number of autonomous wireless and sensor nodes. The inherent characteristics of such networks have made specific applications, such as multimedia transfer and challenging. Basically, the functionality of a node and very few resources directly affect the delivery of packets which depends on the ...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

A Cross-Domain Optimization Scheme for MANET Communications in Heterogeneous Networks

In this paper, we propose a cross-domain optimization (CDO) scheme, which optimizes the MANET topology and enables communication between multiple MANETs via LTE. Particularly, we first deploy a gateway to the center of gravity of all nodes in each MANET so that the network topology is optimized. Thus, the aggregation cost of intra-MANET traffic in the gateway is improved. Likewise, we then depl...

متن کامل

Access Aware Routing Protocol (AARP) Towards Trust Management for Mobile Ad Hoc Networks

In this paper, Access Aware Routing Protocol (AARP) towards Trust Management problem for Mobile Ad hoc Network (MANET) is proposed. In MANET, nodes periodically move over the terrain space with transmission range. In this research work a scheme to handle trust establishment and aggregation issues are proposed. Unlike trust management in previous schemes, trust management in MANET involves neigh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007