Ita Conference Paper - Aggregation of Information Leaked by a Manet
نویسندگان
چکیده
Use of a MANET system will inevitably leak information into the operational environment. An adversary can gain and aggregate information from physical sightings, detection of radio signals and eavesdropping, acquisition of node equipment and detection of patterns of system use and response. This paper investigates the information aggregation threat, viewed as a driver of MANET security design. A security assessment method is sketched, involving an abstract ‘information layer’ that bridges between operational scenarios/ vignettes and MANET system and operation design. The approach focuses on the value of information to the adversary. Recommendations are made for further development.
منابع مشابه
Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR
Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...
متن کاملA New Method to Reduce Energy Consumption in Manet Network Routing based on OLSR Protocol and Genetic Algorithm
Mobile Ad Hoc Networks (MANET) can be considered as a class of unstructured networks created by a number of autonomous wireless and sensor nodes. The inherent characteristics of such networks have made specific applications, such as multimedia transfer and challenging. Basically, the functionality of a node and very few resources directly affect the delivery of packets which depends on the ...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملA Cross-Domain Optimization Scheme for MANET Communications in Heterogeneous Networks
In this paper, we propose a cross-domain optimization (CDO) scheme, which optimizes the MANET topology and enables communication between multiple MANETs via LTE. Particularly, we first deploy a gateway to the center of gravity of all nodes in each MANET so that the network topology is optimized. Thus, the aggregation cost of intra-MANET traffic in the gateway is improved. Likewise, we then depl...
متن کاملAccess Aware Routing Protocol (AARP) Towards Trust Management for Mobile Ad Hoc Networks
In this paper, Access Aware Routing Protocol (AARP) towards Trust Management problem for Mobile Ad hoc Network (MANET) is proposed. In MANET, nodes periodically move over the terrain space with transmission range. In this research work a scheme to handle trust establishment and aggregation issues are proposed. Unlike trust management in previous schemes, trust management in MANET involves neigh...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007