DocumentCode :
3544223
Title :
Tutorial: Privacy Preservation in MANET: Issues and Challenges
Author :
Mishra, Durgesh Kumar
Author_Institution :
Acropolis Inst. of Technol. & Res., Indore, India
fYear :
2012
fDate :
8-10 Feb. 2012
Firstpage :
13
Lastpage :
13
Abstract :
Summary form only given. Sometimes the physically distributed computing devices in a network may be interested in computing some function of their private inputs without disclosing these inputs to one another. This type of computation falls under the category of Secure Multiparty Computation (SMC). The solution to SMC problems in Mobile Ad hoc Networks (MANET) can be found with the modification of the data inputs or with some anonymization technique. MANETs are the wireless networks of the mobile computing devices with no support of any fixed infrastructure. The mobile nodes use any of the radio technology like Bluetooth, IEEE 802.11 or Hiperlan for directly communicating with each other. The nodes behave as hosts as well as routers. The security challenges in the MANET arise due to its dynamic topology, vulnerable wireless link and nomadic environment. An identification mechanism is needed between the nodes using identification and the credentials. This security architecture simultaneously leads to privacy problems. Some mechanism is needed which prevents a node to learn the identity or the credentials of other nodes. To provide location privacy in MANET is a nontrivial task. Current routing protocols do not focus much on the security and the privacy issues. These aspects are postponed till further development. An authentication protocol is needed between nodes using some cryptographic technique. In service-oriented MANET the denial of the service must be taken care of so that the availability of the service is maintained. The security requirement of the ad hoc network depends on its application. For example, for a simple business meeting the requirement is mitigated and for the military battlefield it is severe. Thus no general security architecture can be developed for MANET. Specific security architecture is needed for specific application. Much security related work is still pending and will add to the standards as the physical deployment of the MANET will gro- . In this talk, an emphasis is made on how SMC solutions can be used for privacy preservation during computation.
Keywords :
cryptographic protocols; data privacy; mobile ad hoc networks; mobile computing; service-oriented architecture; telecommunication network topology; telecommunication security; Bluetooth; Hiperlan; IEEE 802.11; SMC problems; anonymization technique; authentication protocol; cryptographic technique; distributed computing devices; dynamic topology; identification mechanism; location privacy; mobile ad hoc networks; mobile computing devices; mobile nodes; nomadic environment; privacy preservation; privacy problems; private inputs; radio technology; secure multiparty computation; security architecture; service-oriented MANET; vulnerable wireless link; wireless networks; Computer architecture; Computer science; Information security; Mobile ad hoc networks; Privacy; Tutorials;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Systems, Modelling and Simulation (ISMS), 2012 Third International Conference on
Conference_Location :
Kota Kinabalu
Print_ISBN :
978-1-4673-0886-1
Type :
conf
DOI :
10.1109/ISMS.2012.148
Filename :
6169667
Link To Document :
بازگشت