Advertisement

Routing Security in Ad Hoc Wireless Networks

  • Mohammad O. Pervaiz
  • Mihaela Cardei
  • Jie Wu
Chapter

Abstract

Wireless networks provide rapid, untethered access to information and computing, eliminating the barriers of distance, time, and location for many applications ranging from collaborative, distributed mobile computing to disaster recovery (such as fire, flood, earthquake), law enforcement (crowd control, search, and rescue), and military communications (command, control, surveillance, and reconnaissance). An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration [11]

Keywords

Node Mobility Malicious Node Route Discovery Message Authentication Code Dynamic Source Route 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgements

This works was supported by the DoD Defense-wide RDTE grant on Secure Telecommunication Networks.

References

  1. J. Barkley, NIST Special Publication: Symmetric Key Cryptography, http://csrc.nist.gov/publications/nistpubs/800-7/node208. html
  2. S. Buchegger and J. L. Boudec, Performance Analysis of the CONFIDANT Protocol Cooperation Of Nodes Fairness In Dynamic Ad-hoc NeTworks, In Proc. of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Jun. 2002.Google Scholar
  3. T. H. Clausen, G. Hansen, L. Christensen, and G. Behrmann, The Optimized Link State Routing Protocol, Evaluation Through Experiments and Simulation, Proc. of IEEE Symp. on Wireless Personal Mobile Communications 2001, Sep. 2001.Google Scholar
  4. W. Du, J. Deng, Y. S. Han, and P. K. Varshney, A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks, ACM CCS 2003, Oct. 2003, pp. 42–51.Google Scholar
  5. Z. J. Haas, The Routing Algorithm for the Reconfigurable Wireless Networks, Proc. of ICUPC 1997, Vol 2, Oct. 1997, pp. 562–566.Google Scholar
  6. Y. -C. Hu, D. B. Johnson and A. Perrig, SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks, Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’02), Jun. 2002.Google Scholar
  7. Y. -C. Hu, D. B. Johnson, and A. Perrig, Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Mobicom’02, 2002.Google Scholar
  8. Y. -C. Hu, D. B. Johnson, and A. Perrig, Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, WiSe 2003, 2003.Google Scholar
  9. Y. -C. Hu, D. B. Johnson, and A. Perrig, Efficient Security Mechanisms for Routing Protocols, The 10th Annual Network and Distributed System Security Symp. (NDSS), Feb. 2003.Google Scholar
  10. 0.
    Y. -C. Hu, A. Perrig, and D. B. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks, Infocom 2003.Google Scholar
  11. 1.
    D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, Kluwer, Dordrecht, Vol 353, 1996, pp. 153–181.Google Scholar
  12. 2.
    R. Kravets, S. Yi, and P. Naldurg, A Security-Aware Routing Protocol for Wireless Ad Hoc Networks, In ACM Symp. on Mobile Ad Hoc Networking and Computing, 2001.Google Scholar
  13. 3.
    S. Murthy and J. J. Garcia-Luna-Aceves, An Efficient Routing Protocol for Wireless Networks, ACM Mobile Networks and Applications Journal, Special Issue on Routing in Mobile Communication Networks, Vol 1, No 2, Oct. 1996, pp. 183–197.CrossRefGoogle Scholar
  14. 4.
    C. S. R. Murthy and B. S. Manoj, Ad Hoc Wireless Networks: Architectures and Protocols, Prentice Hall PTR, 2004.Google Scholar
  15. 5.
    J. Newsome, E. Shi, D. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis & Defenses, Proc. of the 3rd Intl. Symp. on Information Processing in Sensor Networks, 2004.Google Scholar
  16. 6.
    P. Papadimitratos and Z. J. Haas, Secure Routing for Mobile Ad hoc Networks, In Proc. of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan. 2002.Google Scholar
  17. 7.
    V. D. Park and M. S. Corson, A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks, IEEE Infocom 1997, Apr. 1997, pp. 1405–1413.Google Scholar
  18. 8.
    C. E. Perkins and P. Bhagwat, Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers, SIGCOMM’94 Conf. on Communications Architectures, Protocols and Applications, Aug. 1994, pp. 234–244.CrossRefGoogle Scholar
  19. 9.
    C. E. Perkins and E. M. Royer, Ad Hoc On-Demand Distance Vector Routing, IEEE Workshop on Mobile Computing Systems and Applications 1999, Feb. 1999, pp. 90–100.Google Scholar
  20. 0.
    A. Perrig, R. Canetti, D. Tygar, and D. Song, The TESLA Broadcast Authentication Protocol, RSA Cryptobytes (RSA Laboratories), Vol 5, No 2, Summer/Fall 2002, pp. 2–13.Google Scholar
  21. 1.
    K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, A Secure Routing Protocol for Ad hoc Networks, The 10th IEEE Intl. Conf. on Network Protocol (ICNP), Nov. 2002.Google Scholar
  22. 2.
    P. Sinha, R. Sivakumar, and V. Bharghavan, CEDAR: A Core Extraction Distributed Ad Hoc Routing Algorithm, IEEE Journal On Selected Areas in Communications, Vol 17, No 8, Aug. 1999, pp. 1454–1466.CrossRefGoogle Scholar
  23. 3.
    W. Stallings, Cryptography and Network Security: Principles and Practices, 3rd edition, Prentice Hall, New Jersey, 2003.Google Scholar
  24. 4.
    R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, and A. Perrig, SPINS: Security Protocols for Sensor Networks, In 7th Annual ACM Intl. Conf. on Mobile Computing and Networks (Mobicom 2001), 2001.Google Scholar
  25. 5.
    Y. -C. Tseng, S.-Y. Ni, Y.-S. Chen, and J.-P. Sheu, The Broadcast Storm Problem in a Mobile Ad Hoc Network, ACM Wireless Networks, Vol 8, No 2, Mar. 2002, pp. 153–167.MATHCrossRefGoogle Scholar
  26. 6.
    J. Wu and F. Dai, A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks, IEEE Transactions on Computers, Vol 53, No 10, Oct. 2004, pp. 1343–1354.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringFlorida Atlantic UniversityBoca RatonUSA

Personalised recommendations