Security in Battlefield MANETs
September 1, 2006 - December 1, 2007
The battlefield of tomorrow is expected to be filled with wireless devices These devices will be capable of forming mobile ad hoc networks (MANETs) and work together in combinations of mobile and static, sensor and non-sensor nodes. Even though critical data may not be present at all times, we expect that at some time a critical event will occur and crucial data will need to transit the network. Disruptions at this time could have disastrous results in reaction to the event. Assuming an adversary could be monitoring network activity, changes in network traffic patterns could serve as an indicator of a critical event. This indicator could be used by an adversary as a trigger for launching network disruptions. We will be researching ways to mitigate disruption from malicious nodes both outside, and within, the network. Research topics will include reducing the risk of traffic analysis, detection of (and reaction to) malicious nodes, and creating a network environment where malicious nodes become exposed before launching disruptions at a critical time.