Skip to main content

The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks

  • Conference paper
Wired/Wireless Internet Communications (WWIC 2009)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 5546))

Included in the following conference series:

Abstract

Mobile Ad Hoc networks are subject to some unique security issues that could delay their diffusion. Several solutions have already been proposed to enforce specific security properties. However, mobility pattern nodes obey to can, on one hand, severely affect the quality of the security solutions that have been tested over ”synthesized” mobility pattern. On the other hand, specific mobility patterns could be leveraged to design specific protocols that could outperform existing solutions.

In this work, we investigate the influence of a realistic mobility scenario over a benchmark mobility model (Random Waypoint Mobility Model), using as underlying protocol a recent solution introduced for the detection of compromised nodes. Extensive simulations show the quality of the underlying protocol. However, the main contribution is to show the relevance of the mobility model over the achieved performances, stressing out that in mobile ad-hoc networks the quality of the solution provided is satisfactory only when it can be adapted to the nodes underlying mobility model.

This work was partly supported by: The Spanish Ministry of Science and Education through projects TSI2007-65406-C03-01 “E-AEGIS” and CONSOLIDER CSD2007- 00004 “ARES”, and by the Government of Catalonia under grant 2005 SGR 00446.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bandyopadhyay, S., Coyle, E.J., Falck, T.: Stochastic properties of mobility models in mobile ad hoc networks. IEEE Transactions on Mobile Computing 6(11), 1218–1229 (2007)

    Article  Google Scholar 

  2. Bettstetter, C.: Topology properties of ad hoc networks with random waypoint mobility. SIGMOBILE Mob. Comput. Commun. Rev. 7(3), 50–52 (2003)

    Article  Google Scholar 

  3. Capkun, S., Hubaux, J.-P., Buttyán, L.: Mobility helps security in ad hoc networks. In: MobiHoc 2003 (2003)

    Google Scholar 

  4. Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In: MobiHoc 2007 (2007)

    Google Scholar 

  5. Conti, M., Di Pietro, R., Mancini, L.V., Mei, A.: Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks. In: WiSec 2008, pp. 214–219 (2008)

    Google Scholar 

  6. Curtmola, R., Kamara, S.: A mechanism for communication-efficient broadcast encryption over wireless ad hoc networks. Electronic Notes in Theoretical Computer Science (ENTCS) 171(1), 57–69 (2007)

    Article  Google Scholar 

  7. Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: WOWMOM 2006 (2006)

    Google Scholar 

  8. Di Pietro, R., Mancini, L.V., Mei, A.: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks 12(6), 709–721 (2006)

    Article  Google Scholar 

  9. Gabrielli, A., Mancini, L.V., Setia, S., Jajodia, S.: Securing topology maintenance protocols for sensor networks: Attacks and countermeasures. In: SecureComm 2005, pp. 101–112 (2005)

    Google Scholar 

  10. Grossglauser, M., Vetterli, M.: Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion. In: INFOCOM 2003 (2003)

    Google Scholar 

  11. Hayashibara, N., Cherif, A., Katayama, T.: Failure detectors for large-scale distributed systems. In: SRDS 2002 (2002)

    Google Scholar 

  12. Hyytiä, E., Lassila, P., Virtamo, J.: Spatial node distribution of the random waypoint mobility model with applications. IEEE Transactions on Mobile Computing 5(6), 680–694 (2006)

    Article  Google Scholar 

  13. Information Processing Technology Office (IPTO) Defense Advanced Research Projects Agency (DARPA). BAA 07-46 LANdroids Broad Agency Announcement (2007), http://www.darpa.mil/IPTO/solicit/open/BAA-07-46_PIP.pdf

  14. Liu, H., Wan, P.-J., Liu, X., Yao, F.: A distributed and efficient flooding scheme using 1-hop information in mobile ad hoc networks. IEEE Transactions on Parallel and Distributed Systems 18(5), 658–671 (2007)

    Article  Google Scholar 

  15. Luo, J., Hubaux, J.-P.: Joint mobility and routing for lifetime elongation in wireless sensor networks. In: INFOCOM 2005 (2005)

    Google Scholar 

  16. Mei, A., Stefa, J.: SWIM: A simple model to generate small mobile worlds. In: INFOCOM 2009 (2009)

    Google Scholar 

  17. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: IPSN 2004 (2004)

    Google Scholar 

  18. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commununications of ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  19. Piro, C., Shields, C., Levine, B.N.: Detecting the sybil attack in mobile ad hoc networks. In: SecureComm 2006 (2006)

    Google Scholar 

  20. Scott, J., Gass, R., Crowcroft, J., Hui, P., Diot, C., Chaintreau, A.: Crawdad data set cambridge/haggle (v. 2006-01-31) (January 2006), http://crawdad.cs.dartmouth.edu/cambridge/haggle/imote/infocom

  21. Sharma, G., Mazumdar, R., Shroff, N.B.: Delay and capacity trade-offs in mobile ad hoc networks: A global perspective. In: INFOCOM 2006 (2006)

    Google Scholar 

  22. Striki, M., Baras, J., Manousakis, K.: A robust, distributed TGDH-based scheme for secure group communications in MANET. In: Proceedings of ICC 2004 (2006)

    Google Scholar 

  23. Wang, L., Olariu, S.: A two-zone hybrid routing protocol for mobile ad hoc networks. IEEE Trans. Parallel Distrib. Syst. 15(12), 1105–1116 (2004)

    Article  Google Scholar 

  24. Yoon, J., Liu, M., Noble, B.: Random waypoint considered harmful. In: INFOCOM 2003 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Conti, M., Di Pietro, R., Gabrielli, A., Mancini, L.V., Mei, A. (2009). The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks. In: van den Berg, H., Heijenk, G., Osipov, E., Staehle, D. (eds) Wired/Wireless Internet Communications. WWIC 2009. Lecture Notes in Computer Science, vol 5546. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02118-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02118-3_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02117-6

  • Online ISBN: 978-3-642-02118-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics