A survey of survivability in mobile ad hoc networks
- 4 March 2009
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Communications Surveys & Tutorials
- Vol. 11 (1), 66-77
- https://doi.org/10.1109/surv.2009.090106
Abstract
Many efforts have been done towards secure MANETs, but the conventional lines of defense are still inefficient to put all attacks off. This article examines survivable approaches whose goal is to enable networks to fulfill correctly their critical functions even in the presence of attacks or intrusions. We introduce the most relevant survivable MANET initiatives where either preventive or reactive defenses are combined with tolerant ones. We classify the defense lines taking into account intrusion tolerance mechanisms and also identify properties and requirements of survivability. The initiatives are categorized in three groups: routing discovery, data transmission and key management. For each one, they are correlated in terms of requirements and properties. The survey shows that security solutions do not yet explore relevant survivability properties and have only focused on one network layer or one type of attack.Keywords
This publication has 41 references indexed in Scilit:
- Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An AnalysisEURASIP Journal on Wireless Communications and Networking, 2005
- A survey of security issues in mobile ad hoc and sensor networksIEEE Communications Surveys & Tutorials, 2005
- Secure routing for mobile ad hoc networksIEEE Communications Surveys & Tutorials, 2005
- Basic concepts and taxonomy of dependable and secure computingIEEE Transactions on Dependable and Secure Computing, 2004
- Intrusion detection in wireless ad hoc networksIEEE Wireless Communications, 2004
- Secure ad hoc on-demand distance vector routingACM SIGMOBILE Mobile Computing and Communications Review, 2002
- Securing ad hoc networksIEEE Network, 1999
- Diversity coding for transparent self-healing and fault-tolerant communication networksIEEE Transactions on Communications, 1993
- Efficient dispersal of information for security, load balancing, and fault toleranceJournal of the ACM, 1989
- How to share a secretCommunications of the ACM, 1979