Security in Ad Hoc Network and Computing Paradigms

Security in Ad Hoc Network and Computing Paradigms

Poonam Saini (PEC University of Technology, India) and Awadhesh Kumar Singh (National Institute of Technology Kurukshetra, India)
Copyright: © 2019 |Pages: 29
DOI: 10.4018/978-1-5225-8176-5.ch030
OnDemand PDF Download:
List Price: $37.50
10% Discount:-$3.75


Resource sharing is the most attractive feature of distributed computing. Information is also a kind of resource. The portable computing devices and wireless networks are playing a dominant role in enhancing the information sharing and thus in the advent of many new variants of distributed computing viz. ubiquitous, grid, cloud, pervasive and mobile. However, the open and distributed nature of Mobile Ad Hoc Networks (MANETs), Vehicular Ad Hoc Networks (VANETs) and cloud computing systems, pose a threat to information that may be coupled from one user (or program) to another. The chapter illustrates the general characteristics of ad hoc networks and computing models that make obligatory to design secure protocols in such environments. Further, we present a generic classification of various threats and attacks. In the end, we describe the security in MANETs, VANETs and cloud computing. The chapter concludes with a description of tools that are popularly used to analyze and access the performance of various security protocols.
Chapter Preview


The ad hoc network is a collection of wireless mobile nodes that dynamically self-organize in arbitrary and transient network topologies (Macker & Corsen, 1998; Weiser, 1999; Prasant, 2005). The nodes1 can thus be internetworked in areas without a pre-existing communication infrastructure or when the use of such infrastructure requires wireless extension. The ad hoc networks and computing models have the following typical features (Chlamtac, Conti & Liu, 2003; Basagni, Conti, Giordano & Stojmenovic, 2003; Macker & Corson, 2003; Corson, Maker & Cernicione 1999):

  • Continually Changing Topology and Membership: Nodes continuously move in and out of the radio range of other nodes in the network, thereby, frequently reconfiguring the membership information to update the nodes.

  • Unreliable Wireless Links: Due to high mobility and dynamic nature of ad hoc protocols, the links between nodes in such networks are inconsistent. Therefore, the susceptibility to active/passive link attacks increase.

  • Lack of Security Features and Poor Scalability of Security Mechanisms: The security features implemented in statically configured protocols are not sufficient to take care of the requirements of an ad hoc environment. Moreover, with the growth of scalable networks, the security mechanism must be scalable too. Also, the physical protection of mobile hosts is generally poor.

  • Aggregation of Data on Cloud: Clouds have the capability to aggregate private and sensitive information about users in diverse data centers. Hence, the isolation and protection of customer data is an important concern.

  • Browser Security Failures: As the cloud users and administrators rely heavily on Web browsers, the browser security failures can lead to cloud security breaches.

  • Transparency: Customers need confidence and transparency about the performance of the cloud system and its management strategy.

Because of features listed above, ad hoc networks and computing paradigms are more vulnerable to security attacks as compared to traditional networks. Hence, security and privacy becomes necessary to safeguard the leakage of information in such hostile environment.


Security Attacks: A Background

There are many types of security attacks in an ad hoc and computing environment (Karpijoki, 2000; Lundberg, 2000; Hubaux, Buttyan & Capkun, 2001; Buttyan & Hubaux, 2002; Deng, Li & Agrawal, 2002; Ilyas, 2003). Primarily, the attacks can be categorized as following:

Complete Chapter List

Search this Book: