Wednesday 12 November 2008

Multihop Routing Security

Multihop routing security in the integrated networks is another critical issue.
If the multihop routing is corrupted by a malicious intermediary node, the
MS cannot get a correct Internet connection with services. There are three
types of routes in the integrated networks:24 the route from a BS to an MS,
the route from an MS to a BS, and the route between two MSs without
BS. Corresponding to the three types of routes, multihop routing security
should provide security to all the above types of routes. In the process
of route discovery, it is necessary to execute the required principles to
enforce registered MSs to participate in honest route discovery and maintenance
and to exclude the malicious nodes from the routing paths. Owing
to infrastructure-supported multihop routing security, the home network
has the capability to manipulate MS’s billing and credential when an MS
has any malicious action in the process of route discovery. Thus, it is possible
to have a scheme that the Internet maintain a set of metrics to record
the past misbehavers of an MS and a multihop selects well-behaved MSs as
the intermediary MS for packet forwarding. Also, the infrastructure-based
scheme for detecting various misbehaviors is an important issue in the integrated
networks but has been neglected in current security designs. A lot
of issues about securing multihop routing and packet forwarding remain
unexplored:
- How to enforce service availability and cooperation in the integrated
network with a secure mechanism to stimulate MS to participate
in packet forwarding, to refrain from overloading the network, to
thwart the “selfish” MS, and to deter malicious behaviors.
- How to implement fair charging and rewarding for the cooperation
between MSs in packet-forwarding protocol and a reasonable fine
for misbehavers
Reference:Wireless Ad hoc Networking by Shih-Lin Wu & Yu-Chee Tseng

Wireless Ad Hoc Networking
Author:Chang Guang University, Tao-Yuan, Taiwan National Chiao-Tung University, Hsin-Chu, Taiwan
Reader Reviews

What a Techie needs to Understand wireless5
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks by Shih-Lin Wu and Yu-Chee Tseng (Wireless Networks and Mobile Communications: Auerbach) The rapid progress of mobile, wireless communication and embedded micro-sensing MEMS technologies has brought about the rise of pervasive computing. Wireless local-area networks (WLANs) and wireless personal-area networks (WPANs) are now common tools for many people, and it is predicted that wearable sensor networks will greatly improve everyday life as we know it.
By integrating these technologies into a pervasive system, we can access information and use computing resources anytime, anywhere, and with any device. Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks covers these key technologies used in wireless ad hoc networks. The book is divided into three parts, each providing self-contained chapters written by international experts. Topics include networking architectures and protocols, cross-layer architectures, localization and location tracking, time synchronization, QoS and real-time, security and dependability, applications, modeling and performance evaluation, implementation and experience, and much more.
The book is novel in its single source presentation of ad hoc networking and its key technologies and applications over the platforms of personal-area, sensory-area, and local-area networks. It is a valuable resource for those who work in or are interested in learning about the pervasive computing environment.
Features:
* Covers key technologies in wireless and ad hoc networks for personal-area, local-area, and sensory-area networks
* Presents state-of-the-art research and developments by an international team of experts
* Explores topics from networking architectures and protocols to implementation experience and measurements

No comments: