Provable security in mobile ad hoc networks
Mike Burmester - Florida State
Feb 15, 2006Size: 199.5MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractMobile ad hoc networks (MANETs) are collections of wireless mobile nodes
with links that are made or broken in an arbitrary way. Communication is
achieved via routes whose node relay packets. Several routing algorithms
have been proposed in the literature. These focus mainly on efficiency with security relegated to weak adversary models.
In this talk we consider the security of distributed MANET applications
in malicious adversary models. We model a MANET by a stochastic finite state machine that is subject to mobility, medium and markovian constraints and describe an adversary structure that addresses the malicious attacks that are particular to MANETS (wormhole attacks, Sybil attacks, packet dropping, selfishness). We then show how the traditional cryptographic framework for provable security can be adapted to this particular adversary structure.
Finally we consider two complementary approaches that can be used to
achieve provably secure routing in our adversary model: a reactive approach that traces malicious behavior and a proactive approach that tolerates malicious behavior.
About the SpeakerMike Burmester is a professor at Florida State University since 2001.
Earlier, he was at Royal Holloway, London University.
He got his BSc from Athens University and PhD from Rome University.
His research interests include key distribution, privacy, anonymity,
network security and watermarking. He is a member of the International
Association for Cryptological Research and a Fellow of the Institute
of Mathematics and Applications.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.