Skip to main content

Routing Security in Ad Hoc Wireless Networks

  • Chapter
  • First Online:
Network Security

Abstract

Wireless networks provide rapid, untethered access to information and computing, eliminating the barriers of distance, time, and location for many applications ranging from collaborative, distributed mobile computing to disaster recovery (such as fire, flood, earthquake), law enforcement (crowd control, search, and rescue), and military communications (command, control, surveillance, and reconnaissance). An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration [11]

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. J. Barkley, NIST Special Publication: Symmetric Key Cryptography, http://csrc.nist.gov/publications/nistpubs/800-7/node208. html

  2. S. Buchegger and J. L. Boudec, Performance Analysis of the CONFIDANT Protocol Cooperation Of Nodes Fairness In Dynamic Ad-hoc NeTworks, In Proc. of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Jun. 2002.

    Google Scholar 

  3. T. H. Clausen, G. Hansen, L. Christensen, and G. Behrmann, The Optimized Link State Routing Protocol, Evaluation Through Experiments and Simulation, Proc. of IEEE Symp. on Wireless Personal Mobile Communications 2001, Sep. 2001.

    Google Scholar 

  4. W. Du, J. Deng, Y. S. Han, and P. K. Varshney, A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks, ACM CCS 2003, Oct. 2003, pp. 42–51.

    Google Scholar 

  5. Z. J. Haas, The Routing Algorithm for the Reconfigurable Wireless Networks, Proc. of ICUPC 1997, Vol 2, Oct. 1997, pp. 562–566.

    Google Scholar 

  6. Y. -C. Hu, D. B. Johnson and A. Perrig, SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks, Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’02), Jun. 2002.

    Google Scholar 

  7. Y. -C. Hu, D. B. Johnson, and A. Perrig, Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Mobicom’02, 2002.

    Google Scholar 

  8. Y. -C. Hu, D. B. Johnson, and A. Perrig, Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, WiSe 2003, 2003.

    Google Scholar 

  9. Y. -C. Hu, D. B. Johnson, and A. Perrig, Efficient Security Mechanisms for Routing Protocols, The 10th Annual Network and Distributed System Security Symp. (NDSS), Feb. 2003.

    Google Scholar 

  10. Y. -C. Hu, A. Perrig, and D. B. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks, Infocom 2003.

    Google Scholar 

  11. D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, Kluwer, Dordrecht, Vol 353, 1996, pp. 153–181.

    Google Scholar 

  12. R. Kravets, S. Yi, and P. Naldurg, A Security-Aware Routing Protocol for Wireless Ad Hoc Networks, In ACM Symp. on Mobile Ad Hoc Networking and Computing, 2001.

    Google Scholar 

  13. S. Murthy and J. J. Garcia-Luna-Aceves, An Efficient Routing Protocol for Wireless Networks, ACM Mobile Networks and Applications Journal, Special Issue on Routing in Mobile Communication Networks, Vol 1, No 2, Oct. 1996, pp. 183–197.

    Article  Google Scholar 

  14. C. S. R. Murthy and B. S. Manoj, Ad Hoc Wireless Networks: Architectures and Protocols, Prentice Hall PTR, 2004.

    Google Scholar 

  15. J. Newsome, E. Shi, D. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis & Defenses, Proc. of the 3rd Intl. Symp. on Information Processing in Sensor Networks, 2004.

    Google Scholar 

  16. P. Papadimitratos and Z. J. Haas, Secure Routing for Mobile Ad hoc Networks, In Proc. of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan. 2002.

    Google Scholar 

  17. V. D. Park and M. S. Corson, A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks, IEEE Infocom 1997, Apr. 1997, pp. 1405–1413.

    Google Scholar 

  18. C. E. Perkins and P. Bhagwat, Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers, SIGCOMM’94 Conf. on Communications Architectures, Protocols and Applications, Aug. 1994, pp. 234–244.

    Chapter  Google Scholar 

  19. C. E. Perkins and E. M. Royer, Ad Hoc On-Demand Distance Vector Routing, IEEE Workshop on Mobile Computing Systems and Applications 1999, Feb. 1999, pp. 90–100.

    Google Scholar 

  20. A. Perrig, R. Canetti, D. Tygar, and D. Song, The TESLA Broadcast Authentication Protocol, RSA Cryptobytes (RSA Laboratories), Vol 5, No 2, Summer/Fall 2002, pp. 2–13.

    Google Scholar 

  21. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, A Secure Routing Protocol for Ad hoc Networks, The 10th IEEE Intl. Conf. on Network Protocol (ICNP), Nov. 2002.

    Google Scholar 

  22. P. Sinha, R. Sivakumar, and V. Bharghavan, CEDAR: A Core Extraction Distributed Ad Hoc Routing Algorithm, IEEE Journal On Selected Areas in Communications, Vol 17, No 8, Aug. 1999, pp. 1454–1466.

    Article  Google Scholar 

  23. W. Stallings, Cryptography and Network Security: Principles and Practices, 3rd edition, Prentice Hall, New Jersey, 2003.

    Google Scholar 

  24. R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, and A. Perrig, SPINS: Security Protocols for Sensor Networks, In 7th Annual ACM Intl. Conf. on Mobile Computing and Networks (Mobicom 2001), 2001.

    Google Scholar 

  25. Y. -C. Tseng, S.-Y. Ni, Y.-S. Chen, and J.-P. Sheu, The Broadcast Storm Problem in a Mobile Ad Hoc Network, ACM Wireless Networks, Vol 8, No 2, Mar. 2002, pp. 153–167.

    Article  MATH  Google Scholar 

  26. J. Wu and F. Dai, A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks, IEEE Transactions on Computers, Vol 53, No 10, Oct. 2004, pp. 1343–1354.

    Article  Google Scholar 

Download references

Acknowledgements

This works was supported by the DoD Defense-wide RDTE grant on Secure Telecommunication Networks.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad O. Pervaiz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Pervaiz, M.O., Cardei, M., Wu, J. (2010). Routing Security in Ad Hoc Wireless Networks. In: Huang, SH., MacCallum, D., Du, DZ. (eds) Network Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73821-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-73821-5_6

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-73820-8

  • Online ISBN: 978-0-387-73821-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics