Design Challenges in MANET Protocols
A mobile ad hoc network [1] consists of wireless mobile
nodes forming a temporary network without the help of centralized
infrastructure, and where nodes communicate through
multi-hops.
Security protocol designers for MANETs face technical
challenges due to severe resource constraints in bandwidth,
memory size, battery life, computational power, and unique
wireless characteristics such as openness to eavesdropping,
lack of specific ingress and exit points, high security threats,
vulnerability, unreliable communication, and rapid changes
in topologies or memberships because of user mobility or
node failure [1][2][3]. In addition, compared with designing
security protocols for civilian MANETs, designing security
protocols for military MANETs requires additional caution,
since battlefield communication networks must cope with
hostile environments, node heterogeneity, often stringent performance
constraints, node subversion, high tempo operations
leading to rapid changes in network topology and service
requirements, and dynamically formed communities of interest
wherein participants may not have predefined trust
relationships [4]. To cope with these dynamics, networks
must be able to reconfigure seamlessly, via low-complexity
distributed network management schemes [3]. Security in a
tactical network includes notions of communication security
which can be easily quantified as opposed to the perception
of security which is hard to quantify
Design Challenges in MANET ProtocolsA mobile ad hoc network [1] consists of wireless mobilenodes forming a temporary network without the help of centralizedinfrastructure, and where nodes communicate throughmulti-hops.Security protocol designers for MANETs face technicalchallenges due to severe resource constraints in bandwidth,memory size, battery life, computational power, and uniquewireless characteristics such as openness to eavesdropping,lack of specific ingress and exit points, high security threats,vulnerability, unreliable communication, and rapid changesin topologies or memberships because of user mobility ornode failure [1][2][3]. In addition, compared with designingsecurity protocols for civilian MANETs, designing securityprotocols for military MANETs requires additional caution,since battlefield communication networks must cope withhostile environments, node heterogeneity, often stringent performanceconstraints, node subversion, high tempo operationsleading to rapid changes in network topology and servicerequirements, and dynamically formed communities of interestwherein participants may not have predefined trustrelationships [4]. To cope with these dynamics, networksmust be able to reconfigure seamlessly, via low-complexitydistributed network management schemes [3]. Security in atactical network includes notions of communication securitywhich can be easily quantified as opposed to the perceptionof security which is hard to quantify
การแปล กรุณารอสักครู่..
