• Keine Ergebnisse gefunden

Modeling availability in tactical mobile ad hoc networks for situational awareness

N/A
N/A
Protected

Academic year: 2022

Aktie "Modeling availability in tactical mobile ad hoc networks for situational awareness"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Modeling Availability in Tactical Mobile Ad hoc Networks for Situational Awareness

Simon Hunke, Gabriel Klein, Marko Jahnke

Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE Neuenahrer Straße 20, 53343 Wachtberg, Germany

firstname.lastname@fkie.fraunhofer.de

Abstract:Mobile ad hoc networks (MANETs) provide a powerful technology to cre- ate self-organizing networks of mobile computing devices without existing infrastruc- tures. In tactical deployment scenarios (e.g., disaster area rescue missions or military deployment), significant protection demands arise. To defend MANETs against inter- nal and external attacks on the availability of its internal resources, it is necessary to achieve situational awareness (SA).

This contribution describes an extended modeling approach that represents the key properties of the observed environment in data structures. These enable the interpre- tation and prediction of the environment under different circumstances (e.g., under at- tack), using quantifiable security metrics. The enhancements described and discussed here cover shortcomings of earlier work, especially potential modeling inconsistencies in terms of objectively measurable availability values (e.g., on the physical layer).

1 Introduction

So-called tactical mobile ad hoc networks (tactical MANETs) comprise a number of mo- bile devices that communicate spontaneously via radio broadcast technology. Due to each node’s ability to relay protocol packets for other nodes and the self-organizing determina- tion of routes in the MANET (multi-hop routing), this technology provides great possibili- ties to utilize networking computer systems and distributed applications in areas where no fixed wired or radio communication infrastructure is available (yet).

Deployment scenarios for MANETs include tactical environments, such as military (e.g., command posts, infantry troops) and civil ones (e.g., disaster area rescue personnel, au- tonomous robot systems). Since information is broadcast using radio technology and since devices may also get lost during mission due to their small form-factors, both devices and the network need to be protected by means of resource-saving encryption as well as (po- tentially biometrics-based) user authentication. Due to the potential high level of criticality of the missions supported by the MANETs and due to the aforementioned enlarged attack surfaces, these networks have great protection demands, requiring not only preventive, but also monitoring (e.g., [JKW+08]) and response (e.g., [KRS+10]) capabilities.

Availability is a key requirement for tactical MANETs, because the nodes relay network protocol packets for each other and resources are very limited. Thus, resource availability

110

Referenzen

ÄHNLICHE DOKUMENTE

Furthermore, the random selection scheme comes with high costs especially when the number of malicious nodes is increased while the probabilistic scheme’s results are only

A wireless Mobile Ad hoc NETwork (MANET), often termed as self-organized, is built on the cooperation between two or more network nodes. MANETs have a variety of applications where

In multicast communication the sender needs to deal with data privacy over not only one established route to one receiver but the connections to a group of receivers. If there is

– When node S wants to send a packet to node D, but does not know a route to D, node S initiates a route discovery. – Source node S floods Route

– An intermediate node (not the destination) may also send a Route Reply (RREP) provided that it knows a more recent path than the one previously known to sender S. – To

Making use of an anonymous overlay network in mobile ad hoc environments would allow a user to be anonymous towards both other members of the anonymous overlay network (who may or

Adaptive protocols perform slightly better in scenarios with a higher update frequency (400 updates) because more information in the network produces more status information

An entry in the anycast routing table contains an anycast address, the unicast address of the successor node, the unicast address of the anycast peer, the anycast peer’s DSN,