With the wireless media and ad hoc nodes operating both as routers and communication end-terminals, the ad hoc routing protocols are more prone to attacks than the network layer of fixed networks. Authenticated routing messages are a primary concern in the provisioning of a reliable network service.
The scope of this dissertation has been network layer security in ad hoc networks intended for the operational scenario of emergency and rescue operations. The main objectives have been to investigate the applicability of existing security schemes for ad hoc networks, and to contribute to the development of resource efficient, yet robust and appropriate protection schemes.
The majority of secure ad hoc routing protocols proposed so far, tend to focus on the protection techniques, rather than the computational cost and bandwidth consumption. Our work highlights the importance of taking these factors into consideration in the design of secure routing protocols. In addition, attention must be paid to the nature of routing control traffic and its discrepancies from ordinary application data.
The thesis is based on our research published in four articles. Our contributions include a comprehensive survey of key management methods proposed for ad hoc networks and an evaluation of the applicability for initialization and maintenance of a protected network service. The applicability of identity-based public key schemes for protection of ad hoc routing information is also analyzed. Scalability remains an issue even with ID-based schemes that remove the need for bandwidth consuming certificate exchanges. A hybrid protection scheme is therefore proposed for the Optimized Link-State Routing protocol (OLSR). The protection scheme reduces both computational cost and bandwidth consumption by combining identity-based signatures with values from a hash chain. And last, a simple and robust, yet scalable, method is introduced for the distribution of revocation information in ad hoc networks.
List of papers.
A.M. Hegland, E. Winjum, S.F. Mjølsnes, C. Rong, Ø. Kure, and P. Spilling.
Survey of Key Management in Ad Hoc Networks.
IEEE Communications Surveys & Tutorials, Vol. 8, no. 3, 3rd Quarter, 2006, pp. 48-66. (c) 2006 IEEE.
A.M. Hegland, E. Winjum, P. Spilling, C. Rong, and Ø. Kure.
Analysis of IBS for MANET Security in Emergency and Rescue Operations.
Proceedings of the IEEE International Conference on Advanced Information Networking and Applications (AINA ’06), 2006, pp. 155-159. (c) 2006 IEEE.
A.M. Hegland, P. Spilling, L. Nilsen, and Ø. Kure.
Hybrid Protection of OLSR
Presented at the Workshop on Cryptography for Ad Hoc Networks (WCAN’06) held in conjunction with the 33rd International Colloquium on Automata, Languages and Programming (ICALP 2006), 2006.
A.M. Hegland, P. Spilling, Ø. Kure, and L. Nilsen.
On the Distribution of Revocation Information in Ad Hoc Networks.
Proceedings of the Third International Conference on Wireless and Mobile Communications. (ICWMC’07), 2007, p. 84. (c) 2007 IEEE.