<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Node-Level Information Security Monitoring for Mobile Ad Hoc Networks</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Reijo Savola VTT Technical Research Centre of Finland</institution>
          ,
          <addr-line>Oulu</addr-line>
          ,
          <country country="FI">Finland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>- Inherent freedom due to lack of central authority in selforganized mobile ad hoc networks introduces challenges to security and trust management. Arguably, trust management is the most critical security issue in mobile ad hoc networks. If nodes do not have any prior knowledge of each other, the trust establishment becomes complicated. In this kind of situations, the nodes themselves should be responsible of their own security. We propose a model for security management in self-organizing mobile ad hoc networks that is based on nodes' own responsibility of their security and node-level security monitoring.</p>
      </abstract>
      <kwd-group>
        <kwd>- security metrics</kwd>
        <kwd>monitoring</kwd>
        <kwd>mobile ad hoc networks</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        Dynamical communication is essential when attempting to
monitor security critical situations dangerous conditions as
early as possible. Mobile ad hoc networks (MANETs) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] are
networks that do not have an underlying fixed infrastructure
and thus have to be self-organizing. In such networks, nodes
co-operatively establish a network independently of any fixed
common computational or storage elements or centralized
management such as base stations. Different kinds of
communication devices can act as nodes of MANETs,
varying from tiny sensors to large computers. Mobile hosts
can join the network on the fly and create a network of their
own. Since an ad hoc network can be deployed rapidly with
relatively low cost, it is a potential option for dynamical
safety and security monitoring systems. Furthermore,
selforganising networks survive better in war and terrorism
scenarios compared to fixed critical infrastructures.
      </p>
      <p>Among all the research issues, information security in
MANETs is particularly challenging due to the highly
dynamic network topology, the lack of central authority, the
shared wireless medium, and memory and performance
resource constraints. Despite the advances in the field, the
research is lacking proposals to measure the overall security
level of mobile ad hoc networks.</p>
      <p>The main contributions of this work are in the analysis of
basis for identification of suitable high-level information
security metrics for mobile ad hoc networks and in the
introduction of an on-the-fly security level estimation
mechanism for MANETs to support both node-level and
network-level decisions.</p>
    </sec>
    <sec id="sec-2">
      <title>II. BACKGROUND</title>
      <p>The nature of ad hoc networks makes them vulnerable to a
number of attacks, such as denial-of-service, interference,
impersonation, eavesdropping, information leakage and data
tampering. In the following, we review the security goals and
security environment of MANETs, discuss the scope of
security, and provide an overview of security metrics.</p>
      <sec id="sec-2-1">
        <title>A. Information Security in MANETs</title>
        <p>The ultimate goal of the security solutions for mobile ad hoc
networks is to provide services for the desired security needs,
mainly confidentiality, integrity, availability, authentication
and non-repudiation, at the desired security level. In general,
the research has noted that traditional security solutions, such
as public key infrastructures, or authentication mechanisms,
are potential also for ad hoc networks, but in many cases they
are not sufficient by themselves.</p>
      </sec>
      <sec id="sec-2-2">
        <title>B. Security Metrics</title>
        <p>
          Technical security metrics can be used to describe, and hence
compare, technical objects. This includes algorithms,
specifications, architectures and alternative designs, products,
and as-implemented systems at different stages of the system
lifecycle. Design vulnerabilities can result from an insecure
design, whereas implementation vulnerabilities are connected
to poor implementation of a product. Thus the former term
typically refers to lower technology maturity. Security
metrics model consists of three components: the object being
measured, the security objectives (i.e. the “measuring rod”
the object is being measured against), and the method of
measurement. The security objectives typically consist of
security requirements, such as specifications or standards,
e.g. Common Criteria (CC) [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] Protection Profiles.
        </p>
        <p>
          III. BASIS OF SECURITY METRICS FOR MANETS
A compositional approach can be used to define security
metrics for MANETs, with the following, possibly iterative,
steps [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]:
1. Define security objectives: the security objectives can
be defined based on the knowledge of the security
environment, assumptions and threats. Among other
things, they should determine the required security level;
2. Select component metrics based on the security
objectives;
3. Find cross-relationships (dependencies) between the
component metrics and possibly re-define component
metrics as independently as possible;
4. Compose integrated security level information: the
final composition mainly depends on the method of
measurement. The composition can be used for both
quantitative and qualitative security metrics.
        </p>
        <p>Critical control information distribution in a mobile ad hoc
network means the location of the critical control information
in that network with respect to time. The following main
types of critical control information distribution can be
identified:
o Trust information (e.g. keys, certicates, signatures),
o Routing information,
o Mobile entity identity information, and
o Packet forwarding information.</p>
        <p>Security metrics can be developed from heuristics that
compare the actual critical control information distribution to
a posteriori knowledge of the most secure distribution of
such information. The most secure distribution is the
distribution the implements best the security goals. It is
possible to develop predictive methods based on a posteriori
knowledge.</p>
        <p>
          In mobile ad hoc networks the cryptographic strength has
tight cross-relationships with trust management, and often
with other critical information management. There are
various ways of describing cryptographic algorithm metrics,
e.g. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]:
o Key length metric: the security of a symmetric
cryptosystem is a function of the length of the key.
However, adding an extra bit does not always exactly
double the effort required to break public key algorithms;
o Attack steps metric: attack steps is defined as the
number of steps required to perform “the best known
attack”;
o Attack time metric: attack time is defined as the time
required to perform the fastest known attack;
o Rounds metric: rounds are important to the strength of
some ciphers;
o Algorithm strength metric: Jorstad and Landgrave [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]
use algorithm strength as a name of a scale developed for
expressing the overall measurement of a cryptographic
algorithm’s strength.
        </p>
        <p>Generally, the most unexplored and the most critical field
in security is the human user behaviour. Human factors have
an enormous impact on the global security level of mobile ad
hoc networks too.</p>
        <p>
          An important consideration from the human user point of
view is user acceptance, or, from a reverse perspective, user
resistance to the systems with which they must interact. The
user resistance manifests itself in various ways, including
improper use of the security mechanisms [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
        </p>
        <p>When the technological solutions for routing. mobility and
trust management become more mature, the effect of product
quality will have more emphasis on the overall security level
of mobile ad hoc networks. With mature technology we can
investigate implementation vulnerabilities. Product quality
metrics can be seen as a general framework for measuring
mature solutions.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>IV. ESTIMATION OF THE SECURITY LEVEL</title>
      <p>In this section we propose an on-the-fly security level
estimation mechanism for a networked monitoring system
based on mobile ad hoc networks. The approach is
selforganized with one exception: a hierarchy of trusted voting
and countermeasure entities is required. If individual trusted
nodes volunteer for these roles, the approach is
selforganized. The objectives for the mechanism include the
following:
o No central database can be used,
o Local monitoring in each node,
o Statistical knowledge of the security level is utilized,
o Measurement should be independent of the routing
mechanism, and
o Decision mechanism to revocate the trust of suspicious
nodes based on the observations of more than one node.</p>
      <p>Clearly, there are two separate goals in the estimation
process:
o Estimation of the security level of a node, and
o Estimation of the security level of the network.</p>
      <sec id="sec-3-1">
        <title>A. Key Elements</title>
        <p>In our estimation approach the key elements of the
architecture are a Measurement Entity (ME) attached to each
node, and a Voting Entity (VE). A Countermeasure Entity
(CME) is also used for the Intrusion Detection functionality.
The estimation is carried out in a mobile ad hoc network by
co-operation between MEs and VEs.</p>
        <p>A Voting Entity (VE) contains the same functionality as
ME. In addition, it has an organizer role in case that that
several MEs are going to make decisions concerning the
security level and trustworthiness of a node. In an ad hoc
network, certain trusted nodes can act as VEs.</p>
        <p>A Countermeasure Entity (CME) acts on the results
obtained from the voting process. Certain trusted nodes can
act as CMEs.</p>
        <p>Because critical information is distributed among MEs,
VEs, and CMEs, a trust establishment and distribution
mechanism is needed to enable the estimation and voting
processes.</p>
      </sec>
      <sec id="sec-3-2">
        <title>B. Estimation</title>
        <p>The basic node-level estimation process is carried out
continuously by the ME of the node. The ME uses the data
stored in its metrics and reputation repository to estimate the
current level of security from its own node point of view.</p>
        <p>The critical information is updated in the reputation
repositories of the MEs to support their estimation of the
security level in the network. A VE can obtain update
information from other VEs located in different parts of the
network. General-level security updates to the MEs’ metrics
repositories can also be delivered using the VEs as a
communication link.</p>
        <p>At node level, MEs support the decision processes of the
node, that use the security level information as an input. For
example, the trustworthiness of a service may be assessed
using the security level monitoring of ME.</p>
      </sec>
      <sec id="sec-3-3">
        <title>C. Voting</title>
        <p>There are a lot of situations where democratic voting can be
used to support decisions to be made about the security level.
For instance, if an ME detects a node with suspicious activity
in the vicinity, voting can be used to justify countermeasures.</p>
        <p>An ME can also inform a VE about its own security level
estimates of an object. A voting process can be used to
compare other MEs’ observations of the same object.</p>
      </sec>
      <sec id="sec-3-4">
        <title>A. Challenges</title>
        <p>Mobile ad hoc networks are intrinsically
resourceconstrained, which makes our approach difficult to
implement using the current technology. However, as the
required level of security is often higher in cases where there
are better memory and computation resources in use, the
introduced approach is possible.</p>
        <p>The selection of voting entities and countermeasure
entities is also a problem in cases where complete
selforganization of the network is a goal. Suitable trust
establishment procedures are needed to select these trusted
entities from a group of nodes. Trust management is also
needed to enable the communication between the VEs, MEs
and CMEs.</p>
        <p>Suitable estimation algorithms should be developed for the
metrics framework. This is a challenging task and requires a
rigorous analysis of the metrics to be used.</p>
        <p>As a long-time goal, general-level statistical knowledge
has to be collected on: security algorithms, network products,
user behaviour, applications, experiences from virus and
worm attacks, etc. – about all critical issues contributing to
the overall level of security.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>V. RELATED WORK</title>
      <p>
        The security level estimation mechanism presented here is
closely related to the Intrusion Detection System (IDS)
approaches proposed for mobile ad hoc networks. Mishra et
al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] provide a state-of-the-art presentation of IDSs for
mobile ad hoc networks. They conclude that application of
IDSs to MANETs is a rather recent development, although in
the wired world this research field has 15 years of tradition.
The common problem in using IDSs for MANETs is the
resource-constrained environment – our estimation
mechanism suffers from the same complication. Zhang and
Lee [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] describe a distributed and co-operative IDS model
where every node in the network participates in the detection
and response: the IDS agent runs at each mobile node.
Bhargava et al. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] propose an intrusion detection and
response model to enhance security in the Ad Hoc On
Demand Distance Vector (AODV) routing protocol.
Kachirski and Guha [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] present an IDS based on mobile agent
technology.
      </p>
    </sec>
    <sec id="sec-5">
      <title>VI. CONCLUSIONS AND FUTURE WORK</title>
      <p>We have discussed the problem of self-measuring the
information security level in a mobile ad hoc network used as
a dynamical communication basis for critical monitoring
applications. Solving this problem clearly requires a
multidisciplinary effort. The current limited knowledge of the
nature of security is hindering us from finding a rigorous
solution. In this paper we have identified some major basis
components that contribute to the security level of MANETs.
The optimum management of critical control information
distribution in time and placement in a mobile ad hoc
network is seen as the major technical goal. Critical
information includes, e.g., keys and certificates, routing
information, identity information and packet forwarding
control information.</p>
      <p>Moreover, we have presented a security level estimation
mechanism that can be used in a networked monitoring
system, where a node has a lot of responsibility of itself and
its neighbours.</p>
      <p>Our future work will include further exploration of
component metric areas and identification of the
dependencies between them.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Bhargava</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Agrawal</surname>
            ,
            <given-names>D. P. Security</given-names>
          </string-name>
          <article-title>Enhancements in AODV Protocol for Wireless Ad Hoc Networks</article-title>
          .
          <source>In Proceedings of IEEE Vehicular Technology Conference (VTC</source>
          <year>2001</year>
          )
          <article-title>Fall</article-title>
          , Vol.
          <volume>4</volume>
          ,
          <year>2001</year>
          ,
          <fpage>2143</fpage>
          -
          <lpage>2147</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Common</given-names>
            <surname>Criteria for Information Technology Security Evaluation</surname>
          </string-name>
          ,
          <year>v2</year>
          .2,
          <string-name>
            <surname>January</surname>
          </string-name>
          <year>2004</year>
          . Available at: www.csrc.nist.gov/cc/.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Internet</given-names>
            <surname>Engineering Task Force (IETF) MANET Working</surname>
          </string-name>
          <article-title>Group</article-title>
          . At: www.ietf.org/html.charters/manet-charter.html.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Jorstad</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Landgrave</surname>
            ,
            <given-names>T. S.</given-names>
          </string-name>
          <string-name>
            <surname>Cryptographic Algorithm</surname>
          </string-name>
          <article-title>Metrics</article-title>
          .
          <source>In Proceedings of the 20th National Information Systems Security Conference</source>
          , Baltimore,
          <string-name>
            <surname>MD</surname>
          </string-name>
          ,
          <year>1997</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Kachirski</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Guha</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <article-title>Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks</article-title>
          .
          <source>In Proceedings of the IEEE Workshop on Knowledge Media Networks</source>
          ,
          <year>2002</year>
          ,
          <fpage>153</fpage>
          -
          <lpage>158</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Mishra</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nadkarni</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Patcha</surname>
            ,
            <given-names>A. Intrusion</given-names>
          </string-name>
          <article-title>Detection in Wireless Ad Hoc Networks</article-title>
          .
          <source>In IEEE Wireless Communications, Feb</source>
          .
          <year>2004</year>
          ,
          <fpage>48</fpage>
          -
          <lpage>60</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Savola</surname>
            <given-names>R.</given-names>
          </string-name>
          and Holappa J.
          <article-title>Self-Measurement of the Information Security Level in a Monitoring System Based on Mobile Ad Hoc Networks</article-title>
          .
          <source>In: Proceedings of the IEEE Int. Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety</source>
          , Orlando, FL, USA,
          <fpage>29</fpage>
          -
          <issue>30</issue>
          <year>March</year>
          ,
          <year>2005</year>
          . 8 p.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Schultz</surname>
            ,
            <given-names>E. E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Proctor</surname>
            ,
            <given-names>R. W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lien</surname>
          </string-name>
          , M.-C., and
          <string-name>
            <surname>Salvendy</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          <article-title>Usability and Security - An Appraisal of Usability Issues in Information Security Methods</article-title>
          . In Computer Security, Vol.
          <volume>20</volume>
          , No. 7,
          <string-name>
            <surname>Oct</surname>
          </string-name>
          .
          <year>2001</year>
          ,
          <fpage>620</fpage>
          -
          <lpage>634</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>W. Intrusion</given-names>
          </string-name>
          <article-title>Detection in Wireless Ad Hoc Networks</article-title>
          .
          <source>In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom)</source>
          .
          <source>Aug</source>
          .
          <year>2000</year>
          ,
          <fpage>275</fpage>
          -
          <lpage>283</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>