Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking

  • Wissam Mallouli
  • Bachar Wehbi
  • Ana Cavalli
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5198)


Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly configured nodes can severely affect the network as all nodes participate in the routing task. For these reasons, it is important to check the validity of ad hoc protocols, to verify whether the running implementation is conform to its specification and to detect security flows in the network. In this paper, we propose a formal methodology to collect and analyze the network traffic trace. Observers running on a set of nodes collect local traces and send them later to a global observer that correlates them into a global trace thanks to an adapted time synchronization mechanism running in the network. The global trace is then analyzed to study the conformance and the security of the running routing protocol. This analysis is performed using dedicated algorithms that check the collected trace against a set of functional and security properties specified in an adapted formal language.


Ad Hoc Networks Monitoring Trace Collection and Correlation Conformance Testing Security Analysis Nomad Logic 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
  2. 2.
    Alcalde, B., Cavalli, A.R., Chen, D., Khuu, D., Lee, D.: Network protocol system passive testing for fault management: A backward checking approach. In: Núñez, M., Maamar, Z., Pelayo, F.L., Pousttchi, K., Rubio, F. (eds.) FORTE 2004. LNCS, vol. 3236, pp. 150–166. Springer, Heidelberg (2004)Google Scholar
  3. 3.
    Badonnel, R., State, R., Festor, O.: Monitoring end-to-end connectivity in mobile ad-hoc networks. In: ICN (2), pp. 83–90 (2005)Google Scholar
  4. 4.
    Byers, D., Ardi, S., Shahmehri, N., Duma, C.: Modeling software vulnerabilities with vulnerability cause graphs. In: ICSM, pp. 411–422 (2006)Google Scholar
  5. 5.
    Chakers, I., Perkins, C.: Dynamic manet on-demand (dymo) routing. IETF Internet-Draft draft-ietf-manet-dymo-06 (work in progress) (October 2006)Google Scholar
  6. 6.
    Clausen, T., J., P., Adjih, C., Laouiti, A., Minet, P., Muhlethaler, P., Qayyum, A., Viennot, L.: Optimized link state routing protocol (OLSR). RFC 3626, Network Working Group (October 2003)Google Scholar
  7. 7.
    Cuppens, F., Cuppens-Boulahia, N., Sans, T.: Nomad: A security model with non atomic actions and deadlines. In: CSFW, pp. 186–196 (2005)Google Scholar
  8. 8.
    Lee, D., Yannakakis, M.: Principles and methods of testing finite state machines - A survey. In: Proceedings of the IEEE, vol. 84, pp. 1090–1126 (1996)Google Scholar
  9. 9.
    Orset, J.-M., Alcalde, B., Cavalli, A.R.: An EFSM-based intrusion detection system for ad hoc networks. In: Peled, D.A., Tsay, Y.-K. (eds.) ATVA 2005. LNCS, vol. 3707, pp. 400–413. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    Orset, J.-M., Cavalli, A.R.: A security model for olsr manet protocol. In: MDM, p. 122 (2006)Google Scholar
  11. 11.
    Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing. RFC 3561 (July 2003)Google Scholar
  12. 12.
    Ploskonka, J.A., Hurson, A.R.: Self-monitoring security in ad hoc routing. In: Kunz, T., Ravi, S.S. (eds.) ADHOC-NOW 2006. LNCS, vol. 4104, pp. 238–251. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  13. 13.
    Ramachandran, K., Belding-Royer, E.M., Almeroth, K.C.: DAMON: A Distributed Architecture for Monitoring Multi-hop Mobile Networks. In: Proceedings of the 1st IEEE International Conference on Sensor and Ad hoc Communications and Networks (SECON) (October 2004)Google Scholar
  14. 14.
    Wehbi, B., Laouiti, A., Cavalli, A.: Accurate and efficient time synchronization mechanism for wireless multi hop networks. Technical report, TELECOM SudParis (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Wissam Mallouli
    • 1
  • Bachar Wehbi
    • 1
  • Ana Cavalli
    • 1
  1. 1.Institut Telecom/Telecom SudParis, CNRS/SAMOVAR 

Personalised recommendations