Abstract
A mobile ad hoc network (MANET) can establish an instant communication structure for many time-critical and mission-critical applications. Nevertheless, the intrinsic characteristics of ad hoc networks, such as wireless transmission and node mobility, make it very vulnerable to security threats. Many security protocol suites have been proposed to protect wireless communications, however, they do not consider anonymity protection and leave identity information freely available to nearby passive eavesdroppers. The goal of passive attacks is very different from those of other attacks on routing, such as route disruption or "denial-of-service" attacks. In fact, the passive enemy will avoid such aggressive schemes, in the attempt to be as "invisible" as possible, until it traces, locates, and then physically destroys legitimate assets [29, 51]. Consider for example a battlefield scenario with ad hoc, multi-hop wireless communications support. The adversary could deploy reconnaissance and surveillance sensor networks in the battlefield and maintain communications among them. Via intercepted wireless transmissions, they could infer the location, movement, number of participants, and even the goals of our task forces. Anonymity and location privacy guarantees for our ad hoc networks are critical, otherwise the entire mission may be compromised. This poses challenging constraints on routing and data forwarding. © 2007 Springer Science+Business Media, LLC.
Original language | English |
---|---|
Title of host publication | Mobile and Wireless Network Security and Privacy |
Editors | S. Kami Makki, Peter Reiher, Kia Makki, Niki Pissinou, Shamila Makki |
Publisher | Springer New York |
Pages | 119-142 |
Edition | 1 |
ISBN (Electronic) | 978-0-387-71058-7 |
ISBN (Print) | 978-0-387-71057-0, 978-1-4419-4378-1 |
DOIs | |
Publication status | Published - 10 Jul 2007 |
Externally published | Yes |