IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security Across Disparate Management Domains in Coalition MANETs

Security Across Disparate Management Domains in Coalition MANETs
View Sample PDF
Author(s): Mudhakar Srivatsa (IBM T.J. Watson Research Center, USA), Dakshi Agrawal (IBM T.J. Watson Research Center, USA)and Andrew D. McDonald (Roke Manor Research Ltd, UK)
Copyright: 2012
Pages: 25
Source title: Wireless Technologies: Concepts, Methodologies, Tools and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-61350-101-6.ch521

Purchase

View Security Across Disparate Management Domains in Coalition MANETs on the publisher's website for pricing and purchasing information.

Abstract

Designing a coalition network for chaotic environments (e.g., responding to a large catastrophe) is challenging because such systems cannot rely on availability of a fixed communication or a security infrastructure. In such situations, a coalition may use Mobile Ad-hoc NETworks (MANETs) to communicate and to extend its operational reach and tempo. In this scenario, bootstrapping security and networking protocols requires that networking protocols cannot assume full existence of operational security protocols and vice-versa. In this chapter, the authors outline a realistic bounded resource adversary model and examine bootstrapping problems in the physical & link layer and the routing layer with the goal of identifying new research challenges and novel solution methodologies. In particular, (i) the authors examine secure link key set up protocols at the physical & link layer that neither use computationally intensive PKI mechanisms nor assume pre-configured shared keys between nodes that belong to different coalition partners, (ii) identify new security issues owing to power saving intra-domain routing protocols that use sophisticated packet matching and forwarding mechanisms; in a coalition setting they also examine inter-domain routing protocols that preserve domain autonomy and yet permits scalable network monitoring and misbehavior detection, (iii) examine identity management issues in MANETs and outline a wireless fingerprinting approach to condone a malicious node from spoofing and forging one or more identities on the network.

Related Content

J. Mangaiyarkkarasi, J. Shanthalakshmi Revathy. © 2024. 34 pages.
Gummadi Surya Prakash, W. Chandra, Shilpa Mehta, Rupesh Kumar. © 2024. 22 pages.
Duygu Nazan Gençoğlan. © 2024. 35 pages.
Smrity Dwivedi. © 2024. 20 pages.
Pallavi Sapkale, Shilpa Mehta. © 2024. 21 pages.
Pardhu Thottempudi, Vijay Kumar. © 2024. 43 pages.
Sathish Kumar Danasegaran, Elizabeth Caroline Britto, S. Dhanasekaran, G. Rajalakshmi, S. Lalithakumari, A. Sivasangari, G. Sathish Kumar. © 2024. 18 pages.
Body Bottom