DOC PREVIEW
MASON ECE 646 - SECURITY IN WIRELESS AD HOC NETWORKS

This preview shows page 1-2 out of 5 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 5 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

SECURITY IN WIRELESS AD HOC NETWORKS ECE 646 Prof Dr. Kris Gaj Amarnath Reddy Peddareddy Wari Karthikeyan Paramasivam Sundhar LakshminarasimhanAbstract An ad hoc network is a collection of wireless nodes that dynamically form a temporary network and operates without the use of existing network infrastructure. In the near future, many personal electronic devices will be able to communicate with each other over a short-range wireless channel. We investigate the principal security issues for such an environment. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective. We need to search for new architecture and mechanisms to protect the wireless networks and mobile computing application. List of alternative protocols/algorithms/implementations/laws you are planning to compare: 1. Security in various Ad Hoc Protocols. • Dynamic Destination Multicast protocol (DDM) • Optimized Link State Routing protocol (OSLR) • On-Demand Multicast Routing Protocol (ODMRP) • Ad Hoc On-Demand Distance-Vector routing protocol (AODV) • Topology Broadcast based on Reverse-Path Forwarding (TBRPF) 2. Techniques to key agreement • Password based Authenticated Key Exchange • Password authenticated Deffie-Hellman Key Exchange 3. Basic properties of trust and their role for security: • Distributed trust model • Password-based Key Agreement • Resurrecting Duckling Security Policy • Distributed Public-Key Management 4. Intrusion Detection techniques in Ad-hoc networks Description of problems/hypothesis we are planning to investigate: 1. Attacks and possible solutions to secure routing • Internal attacks • External attacks 2. Security requirements of ad-hoc networks • Availability. • Confidentiality • Integrity • Non-repudiation 3. Security issues in routing protocols for Ad-hoc networks 4. Security issues in Key Management 5. Issues in designing Intrusion Detection for Ad-hoc networksA list of questions • Why Ad-hoc? • What are the different types of attacks against wireless ad-hoc networks • How does each protocol handle security services? • What are the future applications of Wireless Ad Hoc networks? • What are various security models proposed for ad-hoc network? • What are basic security requirement for add-hoc network? • What is the overhead involved in routing protocols used in Ad Hoc networks • What are the current routing protocols used in Ad Hoc networks • How is a trusted node formed? • How to determine bad node? • How is Key management established? • What is intrusion detection and how is it established? Procedure for verifying the results of investigation The results of our investigation will be based on extensive data collection from various sources that include technical documents, white papers, and periodicals. A thorough web search is in progress. Format and Tentative table of contents: 1. Introduction 1.1 Security Issues in Ad-hoc networks. 1.2 Secure Routing 1.3 Key Management 1.4 Intrusion Detection 2. Secure Ad-hoc Routing in Ad-hoc networks 2.1. Security issues in Ad-hoc Routing • Network infrastructure. • Various attacks on Ad-hoc network. 2.2. Secure Routing Protocols in Ad-hoc networks • Analysis of existing and various secure routing protocols for Ad-hoc networks. • Performance and functionality of various protocols. 3. Key management 3.1 Password based Authenticated Key Exchange 3.2 Password authenticated Deffie-Hellman Key Exchange4. Intrusion detection 4.1 Issues in current IDS techniques 4.2 General Intrusion Detection techniques 4.3 General Architecture for Ad Hoc Intrusion Detection 5. Conclusion Time Schedule 10/01/02 Project specification submission 10/01/02-10/22 Study and analyze security features in Ad hoc routing protocols, this will submitted in the first progress report 10/22/02 First progress report submission. 10/22/02 – 11/12 Detailed study of techniques involved in key agreement in Ad hoc networks .Research will be done in security models of ad -hoc networks and also basic properties of trust involved in these networks. Analyze the possible attacks on these networks and how they can be defeated. 11/12/02 Second Progress report submission 11/12/02-11/26 Study and analyze intrusion detection and architecture of instruction detection. 11/26/02 Third Progress report Submission List of possible areas, where the specification can change depending on the progress of the report Based on the data available on each topic listed in the specifications, we might explain and compare some topics more thoroughly than others. Certain topics may be added or removed depending on the time constraints. But efforts will me made to explore and present maximum material relevant to the topic. References 1. Talking To Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong, Xerox Palo Alto Research Center. 2. William Stallings, Cryptography and Network Security 3. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of Applied Cryptography 4. A Distributed Light-Weight Authentication Model for Ad-hoc Networks Andr´e Weimerskirch and Gilles Thonet 5. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches Patrick Albers, Olivier Camp, Jean-Marc Percher, Bernard Jouga, Ludovic M´e, and Ricardo Puttini6. Intrusion Detection Techniques for Mobile Wireless Networks Yongguang Zhang, Wenke Lee, Yi-An Huang 5. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks Frank Stajano and Ross Anderson 6.


View Full Document

MASON ECE 646 - SECURITY IN WIRELESS AD HOC NETWORKS

Documents in this Course
Load more
Download SECURITY IN WIRELESS AD HOC NETWORKS
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view SECURITY IN WIRELESS AD HOC NETWORKS and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view SECURITY IN WIRELESS AD HOC NETWORKS 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?