Distributed monitoring in ad hoc networks: Conformance and security checking

被引:0
|
作者
Mallouli, Wissam [1 ]
Wehbi, Bachar [1 ]
Cavalli, Ana [1 ]
机构
[1] Inst Telecom Telecom SudParis, CNRS SAMOVAR, Paris, France
关键词
ad hoc networks; monitoring; trace collection and correlation; conformance testing; security analysis; nomad logic;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly configured nodes can severely affect the network as all nodes participate in the routing task. For these reasons, it is important to check the validity of ad hoc protocols, to verify whether the running implementation is conform to its specification and to detect security flows in the network. In this paper, we propose a formal methodology to collect and analyze the network traffic trace. Observers running on a set of nodes collect local traces and send them later to a global observer that correlates them into a global trace thanks to an adapted time synchronization mechanism running in the network. The global trace is then analyzed to study the conformance and the security of the running routing protocol. This analysis is performed using dedicated algorithms that check the collected trace against a set of functional and security properties specified in an adapted formal language.
引用
收藏
页码:345 / 356
页数:12
相关论文
共 50 条
  • [31] Efficient security management for ad hoc networks
    Wang, Sherry
    Zheng, Harold
    Wang, Wenye
    [J]. GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 469 - +
  • [32] Security scheme for ad-hoc networks
    Kalligeros, H
    Hadjiefthymiades, S
    Frantzeskakis, D
    [J]. ISSE 2005 - Securing Electronic Business Processes, 2005, : 52 - 61
  • [33] Security of Ad Hoc Networks and Threshold Cryptography
    Ertaul, L
    Chavan, N
    [J]. 2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, COMMUNICATIONS AND MOBILE COMPUTING, VOLS 1 AND 2, 2005, : 69 - 74
  • [34] Multilevel security model for ad hoc networks
    Changda, Wang
    Shiguang, Ju
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (02) : 391 - +
  • [35] Security and threats of mobile Ad Hoc networks
    Islamic Azad University Tabriz Branch, Tabriz, Iran
    [J]. WSEAS Trans. Commun., 2006, 11 (2123-2128):
  • [36] Security for cluster based ad hoc networks
    Varadharajan, V
    Shankaran, R
    Hitchens, M
    [J]. COMPUTER COMMUNICATIONS, 2004, 27 (05) : 488 - 501
  • [37] Security in Mobile Ad-Hoc Networks
    Athulya, M. S.
    Sheeba, V. S.
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [38] Scaling dependability and security in ad hoc networks
    de Lemos, Rogerio
    [J]. Dependable Computing, Proceedings, 2007, 4746 : 237 - 237
  • [39] Anonymity and Security in Mobile Ad Hoc Networks
    Bolla, Jhansi Vazram
    Vatsavayi, Valli Kumari
    Murthy, J. V. R.
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 71 - +
  • [40] The Study on AD HOC Networks Security Solution
    Li Rongguo
    [J]. ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1451 - 1457