Cross-layer Designs for Security in Wireless Ad Hoc Networks

Cross-layer Designs for Security in Wireless Ad Hoc Networks
Author :
Publisher :
Total Pages : 145
Release :
ISBN-10 : OCLC:644660973
ISBN-13 :
Rating : 4/5 (73 Downloads)

Book Synopsis Cross-layer Designs for Security in Wireless Ad Hoc Networks by : Geethapriya Thamilarasu

Download or read book Cross-layer Designs for Security in Wireless Ad Hoc Networks written by Geethapriya Thamilarasu and published by . This book was released on 2009 with total page 145 pages. Available in PDF, EPUB and Kindle. Book excerpt: With the advances in wireless technologies and proliferation of mobile devices, ad hoc networks will play a significant role in enabling future ubiquitous communications. Despite the convenience of forming networks on the fly, without any pre-existing infrastructure, ad hoc networks suffer from serious security concerns. Security in ad hoc networks is challenging due to shared wireless medium, lack of fixed infrastructure, dynamic network topology and resource constrained users. Owing to these differences, conventional security measures used in wired networks are not suitable for wireless networks. To allow interoperability with other IP based networks such as Internet and 3G, existing wireless networks are built on the foundation of OSI and TCP/IP protocol suite.^However, the evolving wireless systems seriously question the traditional networking paradigm as these protocol stacks which are architected and implemented in a layered manner are not sufficiently flexible to cope with the dynamics in wireless environments. Cross-layer design has received considerable attention in recent years as the alternative networking paradigm for wireless networks. Through interactions and information exchange among protocol layers, these designs can create wireless architectures with better holistic views of network goals and constraints. The main goal of this dissertation is to design and develop efficient cross-layer architectures and techniques to enhance security and reliability in wireless ad hoc networks. In the first part of the thesis, we examine various cross-layer architectures to analyze their efficiency in detecting network anomalies.^Simulation studies indicate that cross-layer design based on a shared database model has higher system stability and lower overhead. Using this design, we developed CIDS, a cross-layer based intrusion detection system with an objective to provide accurate and reliable misbehavior detection in ad hoc networks. Using multiple linear regression analysis we study the correlation between different variables impacting network performance. This framework helps to identify the cause of a network anomaly and exploits the inter layer interactions to distinguish attacks from genuine network disruptions. In the second part of the thesis, we leverage the benefits of cross-layer interactions to provide defense against Denial of Service (DoS) attacks. We model jamming attacks at the physical and MAC layers to study DoS behavior, and analyze their impact on network throughput.^We develop a cross-layer based measurement driven approach where congestion estimation using physical, MAC and network layer information is used to differentiate jamming and congested scenarios for reliable classification of attacks. Next, we provide a game theoretic framework to formulate jamming as a non cooperative Bayesian game to analyze the interaction between attacker and monitor nodes. We develop hybrid energy efficient detection strategies at the monitor using cross-layer features to achieve the balance in security-energy tradeoff. By estimating the game state, we derive optimal attack and detection strategies. Finally, we show that the benefits of cross-layer interactions can be extended to security in wireless sensor networks. Tailoring to the needs of the environment, we develop a distributed security architecture (XLSEC) using cross-layer adaptations for layered ZigBee protocol stack targeted towards sensor networks.^Here, we incorporate cross-layer interactions within the node as well as among other nodes in the network. In addition, we demonstrate that cross-layer based learning techniques can be used to detect anomalies by correlating the information collected by each sensor node at different protocol layers in a machine learning anomaly detection framework (MALADY).


Cross-layer Designs for Security in Wireless Ad Hoc Networks Related Books

Cross-layer Designs for Security in Wireless Ad Hoc Networks
Language: en
Pages: 145
Authors: Geethapriya Thamilarasu
Categories:
Type: BOOK - Published: 2009 - Publisher:

DOWNLOAD EBOOK

With the advances in wireless technologies and proliferation of mobile devices, ad hoc networks will play a significant role in enabling future ubiquitous commu
Adaptation and Cross Layer Design in Wireless Networks
Language: en
Pages: 428
Authors: Mohamed Ibnkahla
Categories: Technology & Engineering
Type: BOOK - Published: 2018-10-08 - Publisher: CRC Press

DOWNLOAD EBOOK

Adaptive techniques play a key role in modern wireless communication systems. The concept of adaptation is emphasized in the Adaptation in Wireless Communicatio
Security in Wireless Ad Hoc and Sensor Networks
Language: en
Pages: 280
Authors: Erdal Cayirci
Categories: Technology & Engineering
Type: BOOK - Published: 2008-12-30 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

This book provides an in-depth guide to security in wireless ad hoc and sensor networks Security in Wireless Ad Hoc and Sensor Networks introduces the reader to
Adaptation and Cross Layer Design in Wireless Networks
Language: en
Pages: 526
Authors: Mohamed Ibnkahla
Categories: Technology & Engineering
Type: BOOK - Published: 2018-10-08 - Publisher: CRC Press

DOWNLOAD EBOOK

Adaptive techniques play a key role in modern wireless communication systems. The concept of adaptation is emphasized in the Adaptation in Wireless Communicatio
Using Cross-Layer Techniques for Communication Systems
Language: en
Pages: 656
Authors: Rashvand, Habib F.
Categories: Computers
Type: BOOK - Published: 2012-04-30 - Publisher: IGI Global

DOWNLOAD EBOOK

Although the existing layering infrastructure--used globally for designing computers, data networks, and intelligent distributed systems and which connects vari