Light weight security architecture for ad hoc networks
The primary objective of the work is to design a security architecture which suits the inherent properties of ad hoc networks. Ad hoc networks are infrastructure-less, highly autonomous and distributed, and consist of nodes which are mostly limited in resources such as, battery power, processing and...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/41881 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-41881 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-418812023-03-04T00:36:41Z Light weight security architecture for ad hoc networks Charles Joseph, John Felix Lee Bu Sung, Francis School of Computer Engineering Centre for Multimedia and Network Technology DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks The primary objective of the work is to design a security architecture which suits the inherent properties of ad hoc networks. Ad hoc networks are infrastructure-less, highly autonomous and distributed, and consist of nodes which are mostly limited in resources such as, battery power, processing and memory capacity. These inherent properties of ad hoc network have led us to design a novel security architecture that suits the ad hoc network characteristics. Typical security architecture comprises of three major components, namely, cryptography, intrusion detection and trust management. In legacy security architectures, cryptographic mechanisms are considered the prime component. However, due to the aforementioned characteristics of ad hoc networks and the complexity of encryption and key management algorithms, cryptography is hard to implement. Thus, in this work, we design a comprehensive security architecture for ad hoc networks with the absence of cryptographic mechanisms. Though the inherent properties of ad hoc networks have caused the paradigm shift in security design for ad hoc networks, there is a unique property in ad hoc networks which needs critical security consideration. The routing methodology in ad hoc networks is "cooperative routing", where nodes depend on their neighbors for routing and data forwarding. This dependency of cooperative behavior from neighbors for routing has spawned an unprecedented vulnerability to attack at the routing layer level. Hence, securing the routing protocol is critical for ad hoc networks. Thus, the prime focus of the security architecture's design is to provide a light-weight routing security for ad hoc networks. The architecture defines three processes, namely, detection, decision and response. Detection process monitors neighbor nodes' routing and data forwarding behavior and identifies malicious activity. Decision process computes the trustworthiness of neighbors by corroborating its local detection outcome with other neighbors' recommendations. The decision process yields the trustworthiness metric for each neighbor. In the response process, the computed trustworthiness metric is integrated into the ad hoc routing protocol's route computation process. Thus, trustworthy nodes are preferred in routes computed by the ad hoc routing protocol. DOCTOR OF PHILOSOPHY (SCE) 2010-09-06T04:52:14Z 2010-09-06T04:52:14Z 2010 2010 Thesis Charles Joseph, J. F. (2010). Light weight security architecture for ad hoc networks. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/41881 10.32657/10356/41881 en 213 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks |
spellingShingle |
DRNTU::Engineering::Computer science and engineering::Computer systems organization::Computer-communication networks Charles Joseph, John Felix Light weight security architecture for ad hoc networks |
description |
The primary objective of the work is to design a security architecture which suits the inherent properties of ad hoc networks. Ad hoc networks are infrastructure-less, highly autonomous and distributed, and consist of nodes which are mostly limited in resources such as, battery power, processing and memory capacity. These inherent properties of ad hoc network have led us to design a novel security architecture that suits the ad hoc network characteristics. Typical security architecture comprises of three major components, namely, cryptography, intrusion detection and trust management. In legacy security architectures, cryptographic mechanisms are considered the prime component. However, due to the aforementioned characteristics of ad hoc networks and the complexity of encryption and key management algorithms, cryptography is hard to implement. Thus, in this work, we design a comprehensive security architecture for ad hoc networks with the absence of cryptographic mechanisms. Though the inherent properties of ad hoc networks have caused the paradigm shift in security design for ad hoc networks, there is a unique property in ad hoc networks which needs critical security consideration. The routing methodology in ad hoc networks is "cooperative routing", where nodes depend on their neighbors for routing and data forwarding. This dependency of cooperative behavior from neighbors for routing has spawned an unprecedented vulnerability to attack at the routing layer level. Hence, securing the routing protocol is critical for ad hoc networks. Thus, the prime focus of the security architecture's design is to provide a light-weight routing security for ad hoc networks. The architecture defines three processes, namely, detection, decision and response. Detection process monitors neighbor nodes' routing and data forwarding behavior and identifies malicious activity. Decision process computes the trustworthiness of neighbors by corroborating its local detection outcome with other neighbors' recommendations. The decision process yields the trustworthiness metric for each neighbor. In the response process, the computed trustworthiness metric is integrated into the ad hoc routing protocol's route computation process. Thus, trustworthy nodes are preferred in routes computed by the ad hoc routing protocol. |
author2 |
Lee Bu Sung, Francis |
author_facet |
Lee Bu Sung, Francis Charles Joseph, John Felix |
format |
Theses and Dissertations |
author |
Charles Joseph, John Felix |
author_sort |
Charles Joseph, John Felix |
title |
Light weight security architecture for ad hoc networks |
title_short |
Light weight security architecture for ad hoc networks |
title_full |
Light weight security architecture for ad hoc networks |
title_fullStr |
Light weight security architecture for ad hoc networks |
title_full_unstemmed |
Light weight security architecture for ad hoc networks |
title_sort |
light weight security architecture for ad hoc networks |
publishDate |
2010 |
url |
https://hdl.handle.net/10356/41881 |
_version_ |
1759857255303348224 |