A Collaborative Firewall for Wireless Ad-Hoc Social Networks

Leonardo Maccari


A collaborative firewall can be realized in a multi-hop distributed wireless network when all or some of the nodes in the network agree on a filtering policy and enforce it when routing a packet. Cooperative firewalling introduces many challenges, how to distribute the rules, how to enforce them, how to reduce the global rule-set in order to limit the impact on the network performance. This paper studies the performance of a collaborative firewall when only a subset of the nodes of the ad-hoc network filter the packets. In order to achieve higher performances the integration with OLSR protocol is proposed. Simulations on realistic scenarios are performed and the source code of the simulator is released.


  1. Alicherry, M., Keromytis, A., and Stavrou, A. (2008). Distributed firewall for manets. Technical report, Columbia University.
  2. Alicherry, M., Keromytis, A. D., and Stavrou, A. (2009). Evaluating a collaborative defense architecture for manets. In Conference on Internet multimedia services architecture and applications, IMSAA.
  3. Fantacci, R., Maccari, L., Ayuso, P., and Gasca, R. (2008). Efficient packet filtering in wireless ad hoc networks. Communications Magazine, IEEE, 46(2):104 -110.
  4. Ioannidis, S., Keromytis, A. D., Bellovin, S. M., and Smith, J. M. (2000). Implementing a distributed firewall. In ACM Conference on Computer and Communications Security, Athens, Greece.
  5. Katsaros, D., Dimokas, N., and Tassiulas, L. (2010). Social network analysis concepts in the design of wireless ad hoc network protocols. Network, IEEE, 24(6):23 -29.
  6. Li, J., Wang, H., and Khan, S. U. (2012). A semanticsbased approach to large-scale mobile social networking. ACM/Springer Mobile Networks and Applications, 17.
  7. Musolesi, M. and Mascolo, C. (2006). A community based mobility model for ad hoc network research. In International workshop on Multi-hop ad hoc networks: from theory to reality, REALMAN 7806.
  8. Neira, P., Gasca, R., Maccari, L., and Lefevre, L. (2008). Stateful firewalling for wireless mesh networks. In New Technologies, Mobility and Security, NTMS 7808.
  9. Sommer, C., Eckhoff, D., German, R., and Dressler, F. (2011). A Computationally Inexpensive Empirical Model of IEEE 802.11p Radio Shadowing in Urban Environments. In 8th Conference on Wireless On demand Network Systems and Services (WONS 2011).
  10. Taghizadeh, M., Khakpour, A., Liu, A., and Biswas, S. (2011). Collaborative firewalling in wireless networks. In Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2011.
  11. Zhang, H., DeCleene, B., Kurose, J., and Towsley, D. (2008). Bootstrapping deny-by-default access control for mobile ad-hoc networks. In Military Communications Conference, 2008. MILCOM 2008. IEEE.
  12. Zhao, H. and Bellovin, S. M. (2009). Source prefix filtering in ROFL. Technical Report CUCS-033-09, Department of Computer Science, Columbia University.
  13. Zhao, H. and Bellovin, S. M. (2010). High performance firewalls in MANETs. In International Conference on Mobile Ad-hoc and Sensor Networks.
  14. Zhao, H., Chau, C.-K., and Bellovin, S. M. (2008a). ROFL: Routing as the firewall layer. In New Security Paradigms Workshop.
  15. Zhao, H., Lobo, J., Roy, A., and Bellovin, S. M. (2011). Policy refinement of network services for MANETs. In The 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011).
  16. Zhao, S., Aggarwal, A., Liu, S., and Wu, H. (2008b). A secure routing protocol in proactive security approach for mobile ad-hoc networks. In Wireless Communications and Networking Conference, WCNC 2008.

Paper Citation

in Harvard Style

Maccari L. (2012). A Collaborative Firewall for Wireless Ad-Hoc Social Networks . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 290-295. DOI: 10.5220/0004071802900295

in Bibtex Style

author={Leonardo Maccari},
title={A Collaborative Firewall for Wireless Ad-Hoc Social Networks},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},

in EndNote Style

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - A Collaborative Firewall for Wireless Ad-Hoc Social Networks
SN - 978-989-8565-24-2
AU - Maccari L.
PY - 2012
SP - 290
EP - 295
DO - 10.5220/0004071802900295