02-10-2012, 04:23 PM
MANET Security Issues
MANET Security Issues.pdf (Size: 152.61 KB / Downloads: 49)
Introduction
With recent performance advancements in computer and
wireless communications technologies, advanced mobile
wireless computing is expected to see increasingly
widespread use and application, much of which will
involve the use of the Internet Protocol (IP) suite. The
vision of mobile ad hoc networking is to support robust
and efficient operation in mobile wireless networks by
incorporating routing functionality into mobile nodes.
Such networks are envisioned to have dynamic,
sometimes rapidly-changing, random, multihop topologies
which are likely composed of relatively bandwidthconstrained
wireless links.
Characteristics of MANETs
A MANET consists of mobile platforms (e.g., a router
with multiple hosts and wireless communications
devices)--herein simply referred to as "nodes"--which are
free to move about arbitrarily. The nodes may be located
in or on airplanes, ships, trucks, cars, perhaps even on
people or very small devices, and there may be multiple
hosts per router. A MANET is an autonomous system of
mobile nodes. The system may operate in isolation, or
may have gateways to and interface with a fixed network.
In the latter operational mode, it is typically envisioned to
operate as a "stub" network connecting to a fixed internet
work. Stub networks carry traffic originating at and/or
destined for internal nodes, but do not permit exogenous
traffic to "transit" through the stub network.
MANET Routing Protocol Performance Issues
To judge the merit of a routing protocol, one needs
metrics—both qualitative and quantitative--with which to
measure its suitability and performance. These metrics
should be *independent* of any given routing protocol.
The following is a list of desirable qualitative properties
of MANET routing protocols:
1) Distributed operation: This is an essential property, but
it should be stated nonetheless.
2) Loop-freedom: Not required per se in light of certain
quantitative measures (i.e. performance criteria), but
generally desirable to avoid problems such as worst-case
phenomena, e.g. a small fraction of packets spinning
around in the network for arbitrary time periods. Ad hoc
solutions such as TTL values can bound the problem, but
a more structured and well-formed approach is generally
desirable as it usually leads to better overall performance.
Conclusion
Importance of MANET cannot be denied as the world of
computing is getting portable and compact.
Unlike wired networks, MANET pose a number of
challenges to security solutions due to their unpredictable
topology, wireless shared medium, heterogeneous
resources and stringent resource constraints etc.
Security is not a single layer issue but a multilayered issue.
It requires a multi fence security solution that provides
complete security spanning over the entire protocol
stack.The Study of this important issue reveals that
security is divided into different directions of the work
like secure routing, key exchange, distribution and
management, secure architecture, intrusion detection and
protection etc.