A SERVICE DISCOVERY THREAT MODEL FOR AD HOC NETWORKS

Adrian Leung, Chris Mitchell

Abstract

The dynamic yet vulnerable nature of an hoc network presents many new security and privacy challenges. Securing the process of service discovery is one of them. Novel solutions are therefore required. However, in order for appropriate security measures to be devised, all possible security threats must first be identified and thoroughly analysed. In this paper, we present a threat model for service discovery in ad hoc networks. Based on these threats, we proceed to derive the security services required to achieve secure service discovery.

References

  1. Gao, Z., Wang, L., Yang, M., and Yang, X. (2006). CNPGSDP: An efficient group-based service discovery protocol for MANETs. Computer Networks. (In Press).
  2. Garcia-Macias, J. A. and Torres, D. A. (2005). Service discovery in mobile ad hoc networks: Better at the network layer? In Proc of 34th International Conference on Parallel Processing (ICPP 2005), pages 452-457. IEEE ComSoc.
  3. Gollmann, D. (2005). Computer Security. John Wiley & Sons, West Sussex, England, 2nd edition.
  4. Guichal, G. and Toh, C. K. (2001). An evaluation of centralized and distributed service location protocols for pervasive wireless networks. In Proc of 12th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2001), pages 55-61.
  5. Lim, B.-I., Choi, K.-H., and Shin, D.-R. (2005). An architecture for lightweight service discovery protocol in Manet. In Proc of 5th International Computational Science Conference (ICCS 2005), pages 963- 966. Springer-Verlag LNCS 3526, Berlin.
  6. Mishra, A. and Nadkarni, K. M. (2003). Security in Wireless Ad Hoc Networks. In Ilyas, M., editor, The Handbook of Ad Hoc Wireless Networks, chapter 30, pages 30.1-30.51. CRC Press, Boca Raton, FL, USA.
  7. Mohan, U., Almeroth, K. C., and Belding-Royer, E. M. (2004). Scalable service discovery in mobile ad hoc networks. In Proc of 3rd IFIP Networking Conference, pages 137-149. Springer-Verlag LNCS 3042, Berlin.
  8. O'Sullivan, J., Edmond, D., and Hofstede, A. (2002). What's in a service? Towards accurate description of non-functional service properties. Distributed and Parallel Databases Journal, 12(2/3):117-133.
  9. Papadimitratos, P. and Hass, Z. J. (2003). Securing mobile ad hoc networks. In Ilyas, M., editor, The Handbook of Ad Hoc Wireless Networks, chapter 31, pages 31.1- 31.17. CRC Press, Boca Raton, FL, USA.
  10. Rao, R. (2004). Integration of on-demand service and route discovery in mobile ad hoc networks. Master's thesis, Dept of Computer Science, North Carolina State University.
  11. Swiderski, F. and Snyder, W. (2004). Threat Modeling. Microsoft Press, Redmond, Washington.
  12. Toh, C. (2002). Ad Hoc Mobile Wireless Networks: Protocols and Systems. Prentice Hall, Upper Saddle River, NJ, USA.
  13. Tseng, Y.-C., Ni, S.-Y., Chen, Y.-S., and Sheu, J.-P. (2002). The broadcast storm problem in a Mobile Ad Hoc Network. Wireless Networks, 8(2-3):153-167.
  14. Tyan, J. and Mahmoud, Q. H. (2005). A comprehensive service discovery solution for Mobile Ad Hoc Networks. Mobile Networks and Applications, 10(4):423-434.
  15. Yau, P. W. and Mitchell, C. J. (2003). Security vulnerabilities in ad hoc networks. In Proc of the 7th Int Symposium on Comms Theory and Applications (ISCTA'03), pages 99-104. HW Communications Ltd.
  16. Zhou, D. (2003). Security issues in ad hoc networks. In Ilyas, M., editor, The Handbook of Ad Hoc Wireless Networks, chapter 32, pages 32.1-32.14. CRC Press, Boca Raton, FL, USA.
Download


Paper Citation


in Harvard Style

Leung A. and Mitchell C. (2006). A SERVICE DISCOVERY THREAT MODEL FOR AD HOC NETWORKS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 167-174. DOI: 10.5220/0002097301670174


in Bibtex Style

@conference{secrypt06,
author={Adrian Leung and Chris Mitchell},
title={A SERVICE DISCOVERY THREAT MODEL FOR AD HOC NETWORKS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={167-174},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002097301670174},
isbn={978-972-8865-63-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - A SERVICE DISCOVERY THREAT MODEL FOR AD HOC NETWORKS
SN - 978-972-8865-63-4
AU - Leung A.
AU - Mitchell C.
PY - 2006
SP - 167
EP - 174
DO - 10.5220/0002097301670174