Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly configured nodes can severely affect the network as all nodes participate in the routing task. For these reasons, it is important to check the validity of ad hoc protocols, to verify whether the running implementation is conform to its specification and to detect security flows in the network. In this paper, we propose a formal methodology to collect and analyze the network traffic trace. Observers running on a set of nodes collect local traces and send them later to a global observer that correlates them into a global trace thanks to an adapted time synchronization mechanism running in the network. The global trace is then analyzed to study the conformance and the security of the running routing protocol. This analysis is performed using dedicated algorithms that check the collected trace against a set of functional and security properties specified in an adapted formal language.
KeywordsAd Hoc Networks Monitoring Trace Collection and Correlation Conformance Testing Security Analysis Nomad Logic
Unable to display preview. Download preview PDF.
- 2.Alcalde, B., Cavalli, A.R., Chen, D., Khuu, D., Lee, D.: Network protocol system passive testing for fault management: A backward checking approach. In: Núñez, M., Maamar, Z., Pelayo, F.L., Pousttchi, K., Rubio, F. (eds.) FORTE 2004. LNCS, vol. 3236, pp. 150–166. Springer, Heidelberg (2004)Google Scholar
- 3.Badonnel, R., State, R., Festor, O.: Monitoring end-to-end connectivity in mobile ad-hoc networks. In: ICN (2), pp. 83–90 (2005)Google Scholar
- 4.Byers, D., Ardi, S., Shahmehri, N., Duma, C.: Modeling software vulnerabilities with vulnerability cause graphs. In: ICSM, pp. 411–422 (2006)Google Scholar
- 5.Chakers, I., Perkins, C.: Dynamic manet on-demand (dymo) routing. IETF Internet-Draft draft-ietf-manet-dymo-06 (work in progress) (October 2006)Google Scholar
- 6.Clausen, T., J., P., Adjih, C., Laouiti, A., Minet, P., Muhlethaler, P., Qayyum, A., Viennot, L.: Optimized link state routing protocol (OLSR). RFC 3626, Network Working Group (October 2003)Google Scholar
- 7.Cuppens, F., Cuppens-Boulahia, N., Sans, T.: Nomad: A security model with non atomic actions and deadlines. In: CSFW, pp. 186–196 (2005)Google Scholar
- 8.Lee, D., Yannakakis, M.: Principles and methods of testing finite state machines - A survey. In: Proceedings of the IEEE, vol. 84, pp. 1090–1126 (1996)Google Scholar
- 10.Orset, J.-M., Cavalli, A.R.: A security model for olsr manet protocol. In: MDM, p. 122 (2006)Google Scholar
- 11.Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing. RFC 3561 (July 2003)Google Scholar
- 13.Ramachandran, K., Belding-Royer, E.M., Almeroth, K.C.: DAMON: A Distributed Architecture for Monitoring Multi-hop Mobile Networks. In: Proceedings of the 1st IEEE International Conference on Sensor and Ad hoc Communications and Networks (SECON) (October 2004)Google Scholar
- 14.Wehbi, B., Laouiti, A., Cavalli, A.: Accurate and efficient time synchronization mechanism for wireless multi hop networks. Technical report, TELECOM SudParis (2008)Google Scholar