05-03-2013, 04:16 PM
Secured Communication for MANETS in Military
Secured Communication for MANETS in Military.pdf (Size: 123.82 KB / Downloads: 49)
Abstract—
A new way to increase the security of data
transmission of mobile ad hoc networks [MANETS] is presented
in this work. There is a massive increase in using MANETS for
unmanned army system for both surveillance and future combat
operations. This has necessitated the development of innovative
MANET solutions catering to the reliability, security and
scalability needs of the defense communications environment
[15]. Security and reliability are crucial aspects of MANET,
especially in security sensitive applications like military. Secure
Message Transmission SMT[1] protocol secure the data
transmission phase by tailoring an end-to-end secure data
forwarding protocol to the MANET communication
requirements and increases the reliability through transmitting
the messages in multiple paths with minimal redundancy. This
work increases the through the removal of Byzantine Faults [8] in
the multiple paths. A binary search probing technique which is
resilient to Byzantine failures caused by individual or colluding
nodes is incorporated in the SMT protocol to provide more
secured transmission. The fault detection algorithm bounds
logarithmically (log n –n the number of nodes in the path), so the
delay is reduced drastically. The simulated implementation of the
work in NS2 shows the marginal increase in the throughput. The
delay and jitter variants can also be improved if the nodes
location can be predicted. Predicting the nodes location and
reducing the unnecessary traffic with the aid of Spatial and
Temporal mining is the second phase of this work.
Keywords- Mobile Ad Hoc Networks; Military; Byzantine
Faults; Secure Transmission; SMT- Secure Message
Transmission; Multipath Message Transmission, Binary Search
Probing; Reliability; Spatial and Temporal Mining, Location
Prediction.
I. INTRODUCTION
Mobile ad hoc networks are advantageous in situations
where there are no network infrastructures available and when
there is a need for people to communicate using mobile
devices. Since MANETS rely on wireless transmission, a
secured way of message transmission is important to protect
the privacy of the data. An insecure ad-hoc network at the edge
of an existing communication infrastructure may potentially
cause the entire network to become vulnerable to security
breaches. The intrinsic nature of wireless ad hoc networks
makes them very vulnerable to attacks ranging from passive
eavesdropping to active interference. In mobile ad hoc
networks, there is no central administration to take care of
detection and prevention of anomalies. However, most of the
existing key management schemes are not feasible in ad hoc
networks because public key infrastructures with a centralized
certification authority are hard to deploy [16],[7] .Consequently
mobile devices identities or their intentions cannot be
predetermined or verified. Therefore nodes have to cooperate
for the integrity of the operation of the network. However,
nodes may refuse to cooperate by not forwarding packets for
others for selfish reasons and not want to exhaust their
resources. Various other factors make the task of secure
communication in ad hoc wireless networks difficult include
the mobility of the nodes, a promiscuous mode of operation,
limited processing power, and limited availability of resources
such as battery power, bandwidth and memory [7].
Attacks on ad hoc are classified into non disruptive passive
attacks and disruptive active attacks. The active attacks are
further classified into external attacks and internal one.
External attacks are carried out by nodes that do not belong to
network and can be prevented by firewalls and encryption
techniques. Internal attacks are from internal nodes which are
actually authorized nodes and part of the network hence it is
difficult to identify them. Lot of works [1], [5], [9], [10] had
been done in the area of identifying and removal of adversaries
in the network. The SMT protocol [5] safeguards pair wise
communication across an unknown frequently changing
network, possibly in the presence of adversaries that may
exhibit arbitrary behavior.
IMPROVING SECURITY, RELIABILITY AND DELAY
Overview
The work presented has two main phases:
1) Phase I – Enhancing Security and Reliability:
Increasing the Security and Reliability of the message
communication in MANETs. This phase is mostly needful for
security sensitive applications like military. The security of the
data transmission can be increased by selecting most secured
routes in Active Path Set (APS).To improve the performance
of the secured message transmission, most secured paths
against Byzantine attacks are selected and included in Active
Path Set. The overall view of Phase I is given in Figure 3. The
reliability is also increased by dropping out only the links in
the faulty path and not the whole path.
VI.FUTUREWORK
In this proposed system, a fixed threshold is used to
identify the faults. Instead of fixed threshold, varying
threshold considering dynamic changing networks can be set.
The system can be compared with any of the multipath routing
protocols like that given in [10]. The additional delay due to
probing might be reduced if the location of nodes after
mobility especially destination node and adversaries can be
predicted. This knowledge about nodes future location and
behavior will be helpful in military applications and also in
pervasive computing where mobile ad hoc networks plays a
major role. Also this work with little variations along with
service oriented architecture can be adapted for providing
privacy [24] and trust in pervasive computing.