15.1. Introduction

Recent trends indicate that the next-generation wireless networks will consist of hybrid wireless access networks and wireless sensor networks [13]. The wireless access networks will be hybrid, that is, they will consist of wide-area mobile data services providing extensive coverage but lower data rates and wireless local-area networks (WLANs) for covering local area hot spots with much higher data rates [2]. Wireless ad hoc connections can assist with missing connections between a wireless device and the rest of a network [1, 3]. Wireless sensor networks (WSNs) are becoming increasing relevant for sensing physical phenomenon for a variety of applications (e.g., structural health monitoring, sampling soil quality). All of these wireless networks are expected to be interconnected in the future.

Already, the public’s demand for and dependence on mobile services makes existing wireless networks a part of the nation’s critical network infrastructure (CNI), and ongoing development of next-generation wireless networks only increases their importance. The continually increasing reliance on wireless networks by businesses, the general public, and government services, and their role in the CNI of the country, make it imperative to have information assurance (IA) built into them. IA for wireless networks is an emerging research area with relatively little literature in comparison to wired networks. While individual wireless technologies currently incorporate some in-built security features, these have been implemented in a largely uncoordinated manner. Availability features for wireless systems are either nonexistent or not well understood [4]. Moreover, IA techniques employed in wired networks have limited direct applicability in wireless networks because of the unique aspects of wireless networks (e.g., user mobility, wireless communication channel, power conservation, limited computational power in mobile nodes, security at the link layer). IA in wireless sensor networks is unique in that the faults and threats that need to be considered are quite different from those in other kinds of networks or distributed systems. Sensor networks consist of perhaps thousands of low-cost, battery-operated units with limited computational power and memory that need to communicate potentially with one another and some sink or base station using wireless links. Consequently, scalability (because of the sheer numbers of nodes), energy efficiency, necessity of lightweight cryptographic protocols, and methods to overcome wireless vulnerabilities are important. Also, it is not possible to assume that sensor units will not be compromised or tampered with for the same reasons. Hence, it is important to consider both outsider and insider threats in sensor networks. Low-cost sensor nodes are likely to fail randomly or stop working due to limited battery life.

Finally, to the best of our knowledge, there is very little literature on how the components of IA, namely availability and security, interact with each other in a wireless network environment. Components failures or coordinated physical/cyber attacks on network equipment will result in security breaches and impact network performance simultaneously. Thus, there is a need to study the coupling between network survivability and security and create design strategies consistent with both sets of requirements [5, 6].

In this chapter, we investigate the security and survivability issues for wireless systems and networks. We first provide a background of hybrid wireless access networks and sensor networks (Section 15.2). We discuss the current survivability and security approaches in hybrid wireless infrastructure networks in Sections 15.3 and 15.4. We then present a premliminary study on the design of security and survivability for wireless ad hoc and sensor networks in Section 15.5. We also discuss with two case studies the issues that relate to the interaction between security and survivability in hybrid wireless access networks and sensor networks in Section 15.6.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset