Existing wireless network security mechanisms and their limitations for ad hoc networks

Author(s):  
G.A. Safdar ◽  
C. McGrath ◽  
M. McLoone
2019 ◽  
Vol 16 (5) ◽  
pp. 2299-2301
Author(s):  
B Palanisamy ◽  
N Karthik ◽  
K Chandrakumar ◽  
K Thirunavukkarasu ◽  
R Jayasudha

2007 ◽  
Vol 15 (3) ◽  
pp. 279-294 ◽  
Author(s):  
Wenjing Lou ◽  
Wei Liu ◽  
Yanchao Zhang ◽  
Yuguang Fang

Sensors ◽  
2021 ◽  
Vol 21 (7) ◽  
pp. 2355
Author(s):  
Pengkun Wang ◽  
Momiao Zhou ◽  
Zhizhong Ding

Mobile ad-hoc networks (MANETs) have great potential applications in military missions or emergency rescue due to their no-infrastructure, self-organizing and multi hop capability characteristics. Obviously, it is important to implement a low-cost and efficient mechanism of anti-invasion, anti-eavesdropping and anti-attack in MANETs, especially for military scenarios. The purpose of intruding or attacking a MANET is usually different from that of wired Internet networks whose security mechanism has been widely explored and implemented. For MANETs, moving target defense (MTD) is a suitable mechanism to enhance the network security, whose basic idea is to continuously and randomly change the system parameters or configuration to create inaccessibility for intruders and attackers. In this paper, a two-layer IP hopping-based MTD approach is proposed, in which device IP addresses or virtual IP addresses change or hop according to the network security status and requirements. The proposed MTD scheme based on the two-layer IP hopping has two major advantages in terms of network security. First, the device IP address of each device is not exposed to the wireless physical channel at all. Second, the two-layer IP hops with individual interval and rules to obtain enhanced security of MANET while maintaining relatively low computational load and communication cost for network control and synchronization. The proposed MTD scheme is implemented in our developed MANET terminals, providing three level of network security: anti-intrusion in normal environment, intrusion detection in offensive environment and anti-eavesdropping in a hostile environment by combining the data encryption technology.


Sign in / Sign up

Export Citation Format

Share Document