Security and Dynamic Encryption System in Mobile Ad-Hoc Network
P. Yu,U. Pooch
DOI: https://doi.org/10.5772/12843
2011-01-30
Abstract:Wireless network technology enables computing devices to communicate with each other without any physical medium. Compared with wired networks, wireless communication provides better connectivity and mobility, which allows mobile devices to access other local area networks or the Internet at anytime and anywhere. The benefits of flexible routing, global connectivity and a highly adaptive potential make mobile ad-hoc networks (MANET) suitable for a wide range of applications in both military and commercial environments, such as battlefields, disaster relief operations, mobile device/ personal networking, mobile information sharing and vehicular networks (Kant et al., 2005); (Liu et al., 2007). However, maintaining security in wireless ad-hoc networks is quite challenging. First, unlike wired networks that at least have some degree of physical protection, wireless communication over radio waves lacks defined and restricted boundaries. Anyone can connect to the network as long as the transmitted signal strength is strong enough to cover the area (Chan et al., 2005), and therefore, security attacks on data communication, such as passive eavesdropping, packet injection or even violations of confidentiality are widespread. Second, the end-to-end communication in MANET cannot rely on any fixed infrastructure, such as a base station or access points (AP); thus, existing security protocols that are based on a centralized or infrastructure-based network environment will not work in this mobile environment (Hubaux et al., 2001). Third, in order to achieve better network throughput in such a highly dynamic environment, the default routing protocol does not implement any security protection during end-to-end communication. In addition, the trust relationships between each node are very low as a consequence of the frequently changing topology and membership. Because of this, many attacks can be launched against the routing protocol, giving hackers a major opportunity to insert themselves as one of the cooperative nodes in the network. Therefore, the security protection that is used to ensure the integrity of the mobile ad-hoc network should not only repel external attacks, but also prevent internal attacks launched against the network from any compromised node. Most security mechanisms rely on data encryption, which is a message combined with a secret key to generate a ciphertext that cannot be revived without the original key. This encryption mechanism can prevent any unauthorized user from gaining access to the secured communication. However, a fixed secret key is vulnerable to deciphering by