Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
ACM Computing Surveys (CSUR) - Special issue: position statements on strategic directions in computing research
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Linux iptables Pocket Reference
Linux iptables Pocket Reference
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
Nomad: A Security Model with Non Atomic Actions and Deadlines
CSFW '05 Proceedings of the 18th IEEE workshop on Computer Security Foundations
Availability Enforcement by Obligations and Aspects Identification
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Understanding the Linux Kernel, 2nd Edition
Understanding the Linux Kernel, 2nd Edition
A Robust Reputation Scheme for Decentralized Group Management Systems
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Improved flooding of broadcast messages using extended multipoint relaying
Journal of Network and Computer Applications
Hi-index | 0.00 |
In this paper, we investigate the use of Aspect-Oriented Programming (AOP) [13] in the domain of Mobile Ad-hoc NETworks (MANETs). More precisely we study the availability issues in Proactive routing protocols. This paper classifies the different possible attacks and examines the countermeasures to ensure availability. Our approach is based on a detection-reaction process. The reasoning followed by the detection process is built on a formal description of normal and incorrect node behaviors. This model allows us to derive security properties. These properties are woven into our implementation using the AOP. Our algorithm checks if these security properties are violated. If they are, detection of incorrect (malicious) behaviors occurs to allow the normal node to find a path without incorrect node behavior. Therefore the detector node sends to its neighborhood the detection information to allow its neighbors to avoid choosing the intruder as a node to cross to. A node chooses the path using its local diagnosis and the reputation of other nodes. Using a field in the standard control message to communicate the detections, our approach does not change the message format, so it is very easy to use and there is no overhead. While we use OLSR as an example of protocol for our studies, we argue that the presented techniques apply equally to any proactive routing protocol for MANETs.