ABSTRACT

Contents 9.1 Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 9.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 9.3 Vulnerabilities, Security Requirements, and Attacks . . . . . . . . . . . . . . . 218

9.3.1 Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 9.3.2 Security Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 9.3.3 Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219

9.4 Secure Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 9.4.1 Vulnerability of Ad Hoc Routing Protocols . . . . . . . . . . . . . . . . . 221 9.4.2 Secure Routing Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222

9.4.2.1 Security-Aware Ad Hoc Routing (SAR) . . . . . . . . . . . . 222 9.4.2.2 Secure Routing Protocol (SRP) . . . . . . . . . . . . . . . . . . . . . 223 9.4.2.3 The Selfish Node (TSN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224

9.4.3 Secure Position Aided Ad Hoc Routing (SPAAR) . . . . . . . . . . . 225 9.5 Key Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226

9.5.1 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 9.5.2 Public Key Infrastructure (PKI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 9.5.3 Key Management Solutions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

9.5.3.1 Partially Distributed Certificate Authority . . . . . . . . . . 229 9.5.3.2 Fully Distributed Certificate Authority . . . . . . . . . . . . . 230

9.6 Intrusion Detection Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 9.7 Conclusions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

9.1 Abstract Mobile ad hoc network is an emerging area of mobile computing and is gradually becoming a new paradigm of wireless network. Its attractiveness includes easy deployment, fast network setting up, and less dependence on infrastructure. In addition, mobile ad hoc network is different from tradition networks in many ways, such as no fixed infrastructure for mobile switching, frequent changes in mobile node topology, and multiple hops between two nodes. The nature of ad hoc makes it difficult to deploy security mechanisms, and thus vulnerabilities of such a network naturally become exploitation of attackers with malicious intentions. In this chapter, we analyze demands, identify challenges, and survey security issues in mobile ad hoc networks. Secure requirements, attacks, secure routing, key management, and intrusion detection are discussed in detail.