05.01.2013 Views

Ad Hoc Networks : Technologies and Protocols - University of ...

Ad Hoc Networks : Technologies and Protocols - University of ...

Ad Hoc Networks : Technologies and Protocols - University of ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

118 Multicasting in <strong>Ad</strong> <strong>Hoc</strong> <strong>Networks</strong><br />

by the network layer will be a change in effective throughput (b<strong>and</strong>width) <strong>and</strong><br />

delay.<br />

4.6.4 Secure Multicasting<br />

Security is an essential requirement in MANET environment. Its importance<br />

is amplified in group communications because <strong>of</strong> the involvement <strong>of</strong> more number<br />

<strong>of</strong> nodes. However, research in this area is still in the very beginning stage.<br />

Multicast in MANETs shares the same security issues as Internet multicast: receiver/source<br />

access control, group key management, multicast fingerprinting<br />

<strong>and</strong> secure multicast routing. The open group membership model makes joining<br />

a lightweight operation which can be conducted at any node. Besides, any host<br />

can send traffic to any multicast group, which the network tries to deliver to all<br />

group members. These properties, though the very spirit <strong>of</strong> multicast service<br />

provisioning, make the multicast service prone to the theft <strong>of</strong> service <strong>and</strong>/or<br />

denial <strong>of</strong> service attacks. Receiver <strong>and</strong> source access control is thus needed. If<br />

there is need to ensure the service is restricted to an authorized group <strong>of</strong> hosts,<br />

group data encryption with group key management is further needed as well. To<br />

prevent attacks towards the routing process, secure mechanisms is a necessity<br />

to group communication protocols.<br />

<strong>Ad</strong> hoc networks have created a lot more additional challenges for implementation<br />

<strong>of</strong> the required security services beyond those that wireless communications<br />

encounter created when compared to wireline networks. The wireless<br />

broadcast media is more prone to both passive <strong>and</strong> active attacks. The MAC<br />

layer solutions to group key management <strong>and</strong> source authentication proposed<br />

for wireline networks need to be modified/enhanced to be able to adopted to<br />

wireless environment. Compared to other wireless communications such as<br />

cellular networks, ad hoc networks require even more sophisticated, efficient,<br />

<strong>and</strong> light-weighted security mechanisms in order to achieve the same security<br />

goals. These extra challenges are caused by, again, the dynamic characteristics<br />

<strong>of</strong> MANETs. First, MANETs lack trusted centralized infrastructure,<br />

which is <strong>of</strong>ten required in previous security proposals for wireline networks.<br />

Threshold-based <strong>and</strong>/or quorum-based approaches have been investigated toward<br />

addressing this problem. Second, the wireless links between nodes in<br />

a MANET is formed <strong>and</strong> torn down in an ad hoc fashion, which results in<br />

ephemeral relationships between nodes. The ephemeral relationships make it<br />

more difficult to build trust based on direct reciprocity. Third, proposed ad hoc<br />

multicast routing schemes are quite different from those for wireline networks.<br />

<strong>Ad</strong>ditionally, MANET multicast has new group models such as geocasting. For<br />

some applications, especially in hostile environments such as battlefield communications,<br />

individual mobile nodes can be captured <strong>and</strong> compromised. As a<br />

result, the entire ad hoc network may be severely threatened. Finally, as always,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!