原文传递 ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks.
题名: ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks.
作者: Levitt, K.; Faloutsos, M.; Krishnamurthy, S.; Swindlehurst, A. L.; Jensen, M.; Kasera, S.; Garcia-Luna-Aceves, J. J.; Cao, G.; Krishnamurthy, P.; Tipper, D.; La Porta, T.; Mohapatra, P.; Wu, F.
关键词: Ad hoc networks, Communication systems, Computer programming, Secure communications, Wireless sensor networks, Computers, Mobile ad hoc networks, Signal processing, Data links, Routing protocols, Wireless networks, Computer communications, Denial of service attack, Communication channels, Mesh networks, Multiple input multiple output, Network science, Wireless communications, Jamming, Cross-layer architecture, Physical-layer security, Mimo(multiple input multiple output)
摘要: Our goal in this project is to develop a cross layer architecture that provides comprehensive security and resilience. Depending on the services desired, our architecture will be able to adaptively provide the right trade-offs between performance, security and fault-resilience. Our strategy for building this architecture is as follows. We will undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at various PI institutions, b) building analytical models to characterize the behavioral nuances of these networks and c) design of new cross layer protocols that protect against vulnerabilities and provide the desired robustness as mentioned above. The distinguishing aspects of this proposed work are that our approach (i) provides accurate, experimentally validated physical and higher layer characterization and dependencies between layers, (ii) unlike previous approaches, accounts for physical layer effects and exploits specialized physical layer features to provide better security and (iii) models and addresses a comprehensive set of possible attacks including attacks by insider nodes. We have a very strong team of PIs that have expertise in physical layer design and modeling, experimental networking research, protocol design and analysis, fault-tolerance and insecurity. Some of the PIs have prior records of both success in DoD programs and in working together on joint projects.
报告类型: 科技报告
相关文献
检索历史
应用推荐