Towards a threat model for mobile ad-hoc networks

  • Authors:
  • Dagmara Spiewak;Thomas Engel;Volker Fusenig

  • Affiliations:
  • University of Luxembourg, Faculty of Sciences, Technology, and Communication, Luxembourg;University of Luxembourg, Faculty of Sciences, Technology, and Communication, Luxembourg;University of Luxembourg, Faculty of Sciences, Technology, and Communication, Luxembourg

  • Venue:
  • ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

The increasing number of mobile devices enabled by wireless communication significantly change security issues and challenge threat modeling research in many ways. Particularly because of the vulnerability of wireless communication channels in addition to the insecure and lacking infrastructure, Mobile Ad-Hoc Networks (MANETs) require an adjusted Threat Model in contrast to the Threat Model faced when dealing with traditional networks. Moreover, mobility implicates ad-hoc routing methods to send data in an open wireless medium and facilitates adversaries in performing various attacks threatening the MANET's security. For this purpose threat modeling is employed to understand the adversary's view, to characterize the security of the system, and to identify the system's threats. In this paper we summarize and discuss protection challenges unique to Mobile Ad-Hoc Networks. We alter the Threat Model Process to Mobile Wireless Ad-Hoc Networks settings based on traditional security principles: Confidentiality, Integrity, Availability, Authentication, and Anonymity (CIAAA).