31-07-2012, 11:34 AM
Security protocols for ad-hoc wireless networks
ad-hoc wireless networks.pdf (Size: 141.72 KB / Downloads: 44)
Project Introduction/Motivation
With the emergence of the integrated circuits, the wireless communication industry has grown by orders of
magnitude. Wireless networks are communication networks in which some of the nodes are mobile. These
nodes connect to the network by utilizing radio frequency (RF).
There are two types of wireless networks. The first type is infrastructure wireless networks. These networks
have routers and gateways as stationary components to which mobile nodes within the network connect.
Mobile nodes connect to the nearest base station whose communication radius covers the area that the
nodes are in. When a mobile node moves out of the coverage area of a base station, it is handed of to a new
base station that covers the area that the node is now in. Cellular phone technology is a typical example of
an infrastructure network.
Protocols to be compared and analyzed
We will research from the ground up, the issues of Ad Hoc Network security. We will document the
various kinds of attacks on Ad Hoc Network routing protocols and the security requirements leading to
redesign of these protocols to counter the attacks. We will research the current proposed solutions starting
with Ariadne and SEAD.
Problems to be investigated
The basic kind of attacks in here involve routing attacks such as malicious routing misdirection,
modification of routing update information and likewise. In order to sup-port use with nodes of limited
CPU processing capability, and to guard against Denial-of-Service (DoS) attacks in which an attacker
attempts to cause other nodes to consume excess network bandwidth or processing time, the secure routing
protocols have been designed. These kind of Secure ad hoc network routing protocols are difficult to
design, due to the generally highly dynamic nature of an ad hoc network and due to the need to operate
efficiently with limited resources, including network bandwidth and the CPU processing capacity, memory,
and battery power (energy) of each individual node in the network. This security mechanism is
incorporated in the non-secure ad hoc network routing protocols designed earlier.