Ad hoc network security issues for Converging Networks (GIGA) September 30, 2005 Pasi Ahonen VTT TECHNICAL RESEARCH CENTRE OF FINLAND Contents • • • • hierarchic ad-hoc networks ad-hoc networks: Security of routing in wireless networks ad-hoc networks (more) user view 10/3/05 2 VTT TECHNICAL RESEARCH CENTRE OF FINLAND hierarchic ad-hoc networks Internet WLAN 2.5 GPRS Mobile Router (MR) MR IPv6 IPv4 MIPv6 MN IPv6 MN MIPv6 3G - E2e Application level security - Appl. level handover - Experimenting with Web and VoIP appl. - Appl. level buffering - Connection management (e.g. SIP) - Behavior in Soft/Hard handover MT Mobile Node (MN) MT Mobile Terminal (MT) MT 10/3/05 3 VTT TECHNICAL RESEARCH CENTRE OF FINLAND ad-hoc networks: Security of routing in wireless networks •Gradual development of trust relationships •What use cases are valid if certain simpler implementations •Simpler node states •Multiple path routing •Evaluation of existing implementations •Real-time application performance •Comparison of routing methods •New Scheduling for packet forwarding Mobile Router (MR) MN Mobile Node (MN) MT Mobile Terminal (MT) MT MT 10/3/05 4 VTT TECHNICAL RESEARCH CENTRE OF FINLAND ad-hoc networks (more) •Monitoring of ad hoc networks to identify attacks •Router configuration (routing tables, security) •Experimental, metrics (also simulations) •Security Analysis •Further development of Open source implementations Mobile Router (MR) MN Mobile Node (MN) MT Mobile Terminal (MT) MT MT 10/3/05 5 VTT TECHNICAL RESEARCH CENTRE OF FINLAND user view • Security info UI for users • Application usage policy definitions • Adaptable to user’s knowledge level • Context aware security (How much to automate and when?) • On/Off: VPN Internet access, Plain Internet access • WAN, LAN, PAN usage according to availability and policy 10/3/05 6 Thank You!
© Copyright 2026 Paperzz