Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
A security model for Hierarchical
#1

A security model for Hierarchical

[attachment=15994]

1. Introduction

Wireless Networks
There are two classifications of wireless network. One of them rely on the fact that there is presence of a basic infrastructure such as wireless LANs and a cellular wireless network.
Second classification which is of our interest is generally referred as Ad-Hoc networks. An Ad hoc wireless network is a collection of mobile devices equipped with interfaces and networking capability. In comparison with fixed wireless networks, there is no master slave relationship that exists in a mobile ad-hoc network. It is adaptive in nature and is self organizing. A formed network can be de-formed and again formed on the fly and this can be done without the help of system administration.

2. The Proceedings

One distinguishing characteristic of ad-hoc network from the security design perspective is the lack of a clear line of defense. Unlike wired networks that have dedicated routers, each mobile node in an ad hoc network may function as a router and forward packets for other peer nodes. The wireless channel is accessible to both legitimate network users and malicious attackers. In such an environment, there is no guarantee that a path between two nodes would be free of malicious nodes, which would not comply with the employed protocol and attempt to harm the network operation. A new scheme has been proposed here to incorporate security features in ad hoc networks especially the hierarchical hybrid network.

4. Security Issues

General security issues encompass Timelessness, Authenticity, Integrity, confidentiality, ordering. They above problems have solutions like Timestamp technique for Timelessness, use of passwords and certificates for authenticity, Digital signatures for Integrity, Encryption for Confidentiality and use of sequence numbers for ordering.

4.1 Passive attacks

Passive attacks are the attacks in which an attacker does not actively participate in bringing the network down. An attacker just eavesdrops on the network traffic as to determine which nodes are trying to establish routes, or which nodes

4.2 Active attacks
These attacks involve some modification of the data stream or the creation of a false stream and can be subdivided into four categories.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.