TITLE:
An Efficient Trusted Computing Base for MANET Security
AUTHORS:
Somya D. Mohanty, Vinay Thotakura, Mahalingam Ramkumar
KEYWORDS:
Algorithm/Protocol Design and Analysis, Network Protocols, Cryptographic Controls, Mobile Ad-Hoc Networks (MANET), Distance Vector (DV) Protocols, Authenticated Data Structures (ADS)
JOURNAL NAME:
Journal of Information Security,
Vol.5 No.4,
October
7,
2014
ABSTRACT: Devices participating in
mobile ad hoc networks (MANET) are expected to strictly adhere to a uniform
routing protocol to route data packets among themselves. Unfortunately, MANET
devices, composed of untrustworthy software and hardware components, expose a
large attack surface. This can be exploited by attackers to gain control over
one or more devices, and wreak havoc on the MANET subnet. The approach
presented in this paper to secure MANETs restricts the attack surface to asingle modulein MANET devices a trusted MANET
module (TMM). TMMs are deliberately constrained to demand only modest memory
and computational resources in the interest of further reducing the attack
surface. The specific contribution of this paper is a precise characterization
of simple TMM functionality suitable for any distance vector based routing
protocol, to realize the broad assurance that “any node that fails to abide by
the routing protocol will not be able to participate in the MANET”.