Distributed monitoring in ad hoc networks: Conformance and security checking

被引:0
|
作者
Mallouli, Wissam [1 ]
Wehbi, Bachar [1 ]
Cavalli, Ana [1 ]
机构
[1] Inst Telecom Telecom SudParis, CNRS SAMOVAR, Paris, France
关键词
ad hoc networks; monitoring; trace collection and correlation; conformance testing; security analysis; nomad logic;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly configured nodes can severely affect the network as all nodes participate in the routing task. For these reasons, it is important to check the validity of ad hoc protocols, to verify whether the running implementation is conform to its specification and to detect security flows in the network. In this paper, we propose a formal methodology to collect and analyze the network traffic trace. Observers running on a set of nodes collect local traces and send them later to a global observer that correlates them into a global trace thanks to an adapted time synchronization mechanism running in the network. The global trace is then analyzed to study the conformance and the security of the running routing protocol. This analysis is performed using dedicated algorithms that check the collected trace against a set of functional and security properties specified in an adapted formal language.
引用
收藏
页码:345 / 356
页数:12
相关论文
共 50 条
  • [1] Distributed security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 166 - 171
  • [2] Advances In Distributed Security For Mobile Ad Hoc Networks
    Filipek, Jozef
    Hudec, Ladislav
    [J]. COMPUTER SYSTEMS AND TECHNOLOGIES, COMPSYSTECH'16, 2016, : 89 - 96
  • [3] A distributed monitoring mechanism for mobile ad hoc networks
    Song, JH
    Hong, F
    Guo, YJ
    [J]. 8th International Symposium on Parallel Architectures, Algorithms and Networks, Proceedings, 2005, : 236 - 240
  • [4] Multigrade Security Monitoring for Ad-Hoc Wireless Networks
    Creti, Matthew Tan
    Beaman, Matthew
    Bagchi, Saurabh
    Li, Zhiyuan
    Lu, Yung-Hsiang
    [J]. 2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 523 - 533
  • [5] Security in ad hoc networks
    Molva, R
    Michiardi, P
    [J]. PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2003, 2775 : 756 - 775
  • [6] ON MODELING ENERGY-SECURITY TRADE-OFFS FOR DISTRIBUTED MONITORING IN WIRELESS AD HOC NETWORKS
    Futaci, Seyhun Mehmet
    Jaffres-Runser, Katia
    Comaniciu, Cristina
    [J]. 2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 894 - 900
  • [7] Distributed Multicast Group Security Architecture for Mobile Ad Hoc Networks
    Kong, Jiejun
    Lee, Yeng-zhong
    Gerla, Mario
    [J]. 2006 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2006), VOLS 1-4, 2006, : 640 - 645
  • [8] Model checking mobile ad hoc networks
    Ghassemi, Fatemeh
    Fokkink, Wan
    [J]. FORMAL METHODS IN SYSTEM DESIGN, 2016, 49 (03) : 159 - 189
  • [9] Model checking mobile ad hoc networks
    Fatemeh Ghassemi
    Wan Fokkink
    [J]. Formal Methods in System Design, 2016, 49 : 159 - 189
  • [10] Security in vehicular ad hoc networks
    Lin, Xiaodong
    Lu, Rongxing
    Zhang, Chenxi
    Zhu, Haojin
    Ho, Pin-Han
    Shen, Xuemin
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 88 - 95