Title :
A trust-based security architecture for tactical MANETS
Author :
Lacharite, Y. ; Nguyen, Dang Quan ; Wang, Maoyu ; Lamont, Louise
Abstract :
Security is a main concern in the establishment of tactical MANETs. Literature is abundant in defining protocol extensions to provide more secure MANET communications. Also many techniques have been developed to identify different types of network attacks, such as the wormhole attack, for example. However, all these security solutions are designed for specific routing protocols. In the absence of a generic security architecture, nodes from different MANET domains cannot cooperate and benefit from security advantages across the entire network, such as secured inter-domain routing, etc. In this paper, we present a general architecture for a security trust monitoring layer that runs on top of routing protocols. This security layer can be applied to different MANET routing protocols and provide monitoring of different network attacks by adding specific plug-ins. Our modular security approach allows nodes, running different routing protocols and equipped with different security solutions, to inter-operate by exchanging security information with each other. The idea is to have a security layer monitor MANET communications and construct a trust representation model of member nodes of the MANET. The trust information gathered can be communicated to MANET nodes (upon request), and such nodes can modify their routing tables accordingly. We show that this security architecture can be implemented on a real MANET test bed. As an example of security attack, we also show the integration of wormhole detection and counter-measure with the security trust monitoring layer performed on this same test bed.
Keywords :
ad hoc networks; mobile radio; routing protocols; telecommunication security; MANET; mobile ad-hoc networks; routing protocols; security trust monitoring layer; trust information; trust-based security; wormhole attacks; wormhole detection; Ad hoc networks; Communication system security; Information security; Mobile ad hoc networks; Monitoring; Network topology; Open systems; Performance evaluation; Routing protocols; Testing;
Conference_Titel :
Military Communications Conference, 2008. MILCOM 2008. IEEE
Conference_Location :
San Diego, CA
Print_ISBN :
978-1-4244-2676-8
Electronic_ISBN :
978-1-4244-2677-5
DOI :
10.1109/MILCOM.2008.4753215