Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/570681.570682acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Securing ad hoc routing protocols

Published: 28 September 2002 Publication History

Abstract

We consider the problem of incorporating security mechanisms into routing protocols for ad hoc networks. Canned security solutions like IPSec are not applicable. We look at AODV[21] in detail and develop a security mechanism to protect its routing information. We also briefly discuss whether our techniques would also be applicable to other similar routing protocols and about how a key management scheme could be used in conjunction with the solution that we provide.

References

[1]
N. Asokan and P. Ginzboorg. Key agreement in ad-hoc networks. Computer Communication Review, 23(17):1627--1637, Nov. 2000.]]
[2]
J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva. A performance comparison of multi-hop wireless ad hoc network routing protocols. In Proceedings of the Fourth Annual International Conference on Mobile Computing and Networking, pages 85--97, 1998.]]
[3]
S. Cheshire and B. Aboba. Dynamic configuration of ipv4 link-local addresses. IETF INTERNET DRAFT, zeroconf working group, June 2001. draft-ietf-zeroconf-ipv4-linklocal-03.txt.]]
[4]
S. Cheung. An efficient message authentication scheme for link state routing. In 13th Annual Computer Security Applications Conference, pages 90--98, 1997.]]
[5]
B. Dahill, B. N. Levine, E. Royer, and C. Shields. A secure routing protocol for ad hoc networks. Technical Report UM-CS-2001-037, University of Massachusetts, Departament of Computer Science, Aug. 2001.]]
[6]
M. Guerrero. Secure ad hoc on-demand distance vector (SAODV) routing. IETF MANET Mailing List, Message-ID [email protected], http://www.cs.ucsb.edu/~eroyer/txt/saodv.txt, Oct. 2001.]]
[7]
Z. J. Haas, M. R. Pearlman, and P. Samar. The interzone routing protocol (IERP) for ad hoc networks. INTERNET DRAFT, MANET working group, July 2002. draft-ietf-manet-zone-ierp-02.txt.]]
[8]
R. Hauser, A. Przygienda, and G. Tsudik. Reducing the cost of security in link state routing. In Symposium on Network and Distributed Systems Security (NDSS '97), pages 93--99, San Diego, California, Feb. 1997. Internet Society.]]
[9]
Y. C. Hu, D. Johnson, and A. Perrig. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02), June 2002, pages 3--13, June 2002.]]
[10]
Y. C. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. Technical Report TR01-383, Rice University, Dec. 2001.]]
[11]
Internet Society. Symposium on Network and Distributed Systems Security (NDSS '97), San Diego, California, Feb. 1997.]]
[12]
D. B. Johnson et al. The dynamic source routing protocol for mobile ad hoc networks (DSR). INTERNET DRAFT, MANET working group, Feb. 2002. draft-ietf-manet-dsr-07.txt.]]
[13]
S. Kent, C. Lynn, J. Mikkelson, and K. Seo. Secure border gateway protocol (S-BGP) --- real world performance and deployment issues, 2000.]]
[14]
H. Krawczyk. Simple forward-secure signatures from any signature scheme. In ACM Conference on Computer and Communications Security, pages 108--115, 2000.]]
[15]
C. Madson and R. Glenn. The use of HMAC-MD5-96 within ESP and AH. Internet Request for Comment RFC 2403, Nov. 1998.]]
[16]
C. Madson and R. Glenn. The use of HMAC-SHA-1-96 within ESP and AH. Internet Request for Comment RFC 2404, Nov. 1998.]]
[17]
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, pages 255--265, 2000.]]
[18]
G. Montenegro and C. Castelluccia. Statistically unique and cryptographically verifiable (SUCV) identifiers and addresses. Network and Distributed System Security Symposium (NDSS '02), Feb. 2002.]]
[19]
G. O'Shea and M. Roe. Child-proof authentication for mipv6 (CAM). ACM Computer Communication Review, Apr. 2001.]]
[20]
P. Papadimitratos and Z. J. Haas. Secure routing for mobile ad hoc networks. SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan 2002.]]
[21]
C. E. Perkins, E. M. Royer, and S. R. Das. Ad hoc on-demand distance vector (AODV) routing. IETF INTERNET DRAFT, MANET working group, Jan. 2002. draft-ietf-manet-aodv-10.txt.]]
[22]
R. Perlman. Fault-tolerant broadcast of routing information. In Computer Networks, n. 7, pages 395--405, 1983.]]
[23]
A. Perrig, R. Canetti, D. Song, and D. Tygar. Efficient and secure source authentication for multicast. In Network and Distributed System Security Symposium (NDSS'01), Feb. 2001.]]
[24]
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar. SPINS: security protocols for sensor netowrks. In Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking, pages 189--199, 2001.]]
[25]
S. Ramanathan and M. Steenstrup. A survey of routing techniques for mobile communications networks. Mobile Networks and Applications, 1(2):89--104, 1996.]]
[26]
E. M. Royer and C.-K. Toh. A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, pages 46--55, Apr. 1999.]]
[27]
B. R. Smith, S. Murthy, and J. J. Garcia-Luna-Aceves. Securing distance-vector routing protocols. In Symposium on Network and Distributed Systems Security (NDSS '97) {11}, pages 85--92.]]
[28]
F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the 7th International Workshop on Security Protocols, number 1796 in Lecture Notes in Computer Science, pages 172--194. Springer-Verlag, Berlin Germany, Apr. 1999.]]
[29]
S. Thomson and T. Narten. Ipv6 stateless address autoconfiguration. IETF Request for Comments, Dec. 1998. RFC 2462.]]
[30]
K. Zhang. Efficient protocols for signing routing messages. In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS'98), July 2001.]]
[31]
L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network Magazine, 13(6):24--30, November/December 1999.]]

Cited By

View all
  • (2024)Performance Evaluation of ID-Based Aggregate Signature Scheme Based on Lattice for Wireless Multi-hop Secure Routing Protocols2024 7th International Conference on Information and Computer Technologies (ICICT)10.1109/ICICT62343.2024.00081(462-467)Online publication date: 15-Mar-2024
  • (2023)SGHRP: Secure Greedy Highway Routing Protocol with authentication and increased privacy in vehicular ad hoc networksPLOS ONE10.1371/journal.pone.028203118:4(e0282031)Online publication date: 6-Apr-2023
  • (2023)Tripartite Transmitting Methodology for Intermittently Connected Mobile Network (ICMN)ACM Transactions on Internet Technology10.1145/343354522:4(1-18)Online publication date: 3-Feb-2023
  • Show More Cited By

Index Terms

  1. Securing ad hoc routing protocols

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WiSE '02: Proceedings of the 1st ACM workshop on Wireless security
    September 2002
    100 pages
    ISBN:1581135858
    DOI:10.1145/570681
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 September 2002

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. SAODV
    2. ad hoc wireless networks
    3. hash chains
    4. routing protocols
    5. secure AODV
    6. security

    Qualifiers

    • Article

    Conference

    WiSe02
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 10 of 41 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)23
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 19 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Performance Evaluation of ID-Based Aggregate Signature Scheme Based on Lattice for Wireless Multi-hop Secure Routing Protocols2024 7th International Conference on Information and Computer Technologies (ICICT)10.1109/ICICT62343.2024.00081(462-467)Online publication date: 15-Mar-2024
    • (2023)SGHRP: Secure Greedy Highway Routing Protocol with authentication and increased privacy in vehicular ad hoc networksPLOS ONE10.1371/journal.pone.028203118:4(e0282031)Online publication date: 6-Apr-2023
    • (2023)Tripartite Transmitting Methodology for Intermittently Connected Mobile Network (ICMN)ACM Transactions on Internet Technology10.1145/343354522:4(1-18)Online publication date: 3-Feb-2023
    • (2023)Trust-Based DSR Protocol for Secure Communication in Mobile Ad-hoc NetworksAdvances in Data-driven Computing and Intelligent Systems10.1007/978-981-99-0981-0_13(167-177)Online publication date: 22-Jun-2023
    • (2022)A Communication-Efficient Secure Routing Protocol for IoT NetworksSensors10.3390/s2219750322:19(7503)Online publication date: 3-Oct-2022
    • (2022)Cyber Security of Connected Autonomous VehiclesEuropean Journal of Science and Technology10.31590/ejosat.1039449Online publication date: 4-Jan-2022
    • (2022)A Proficient Attack Prediction using Hash Algorithm in Manet2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS)10.1109/ICTACS56270.2022.9988726(705-710)Online publication date: 10-Oct-2022
    • (2022)Malicious Finding and Validation Scheme Using New Enhanced Adaptive Ack2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)10.1109/ICSCDS53736.2022.9760753(1220-1224)Online publication date: 7-Apr-2022
    • (2022)Analysis of routing and security issues in OLSR protocol for video streaming over MANETJournal of Discrete Mathematical Sciences and Cryptography10.1080/09720529.2022.207243925:4(1203-1211)Online publication date: 5-Jul-2022
    • (2022)Reliable network lifetime and energy-aware routing protocol for wireless sensor network using hybrid particle swarm-flower pollination search algorithmJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-022-03840-x14:12(16183-16193)Online publication date: 17-Jun-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media