Skip to main content

A Secure Autoconfiguration Protocol for MANET Nodes

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3158))

Abstract

In this paper we propose a secure autoconfiguration model for Manet. Our design is based in a distributed and self-organization certification service, which provides node identification and authentication for the autoconfiguration protocol. We have defined some modifications in the Dynamic Configuration and Distribution Protocol (DCDP) in order to extend the protocol functionalities to include security-aware node identification and authentication services. The overall security is also enforced with intrusion detection techniques.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Corson, S., Marker, J.: Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation consideration. RFC 2501 (informational), IETF (1999)

    Google Scholar 

  2. Hu, Y.C., Johnson, D., Perrig, A.: SEAD: Secure eficient distance vector routing for mobile wireless ad hoc networks. In: Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), June 2002, pp. 3–13 (2002)

    Google Scholar 

  3. Hu, Y.C., Perrig, A., Johnson, D.: Ariadne: A secure On-demand routing protocol for ad hoc networks. In: The Proceedings of ACM MobiCom 2002 (September 2002)

    Google Scholar 

  4. Dahill, B., Sanzgiri, K., Levine, B.N., Shields, C., Royer, E.: A secure routing protocol for ad hoc networks. In: The Proceedings of the 2002 IEEE International Conference on Network Protocols (INCP 2002) (November 2002)

    Google Scholar 

  5. Guerrero, M., Asokan, N.: Securing Ad Hoc Routing Protocols. In: The Proceedings of 2002 ACM Workshop on Wireless Security (WiSe 2002), in conjunction with the ACM MOBICOM2002 (September 2002)

    Google Scholar 

  6. Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002) (January 2002)

    Google Scholar 

  7. Perkins, C.E., Malinen, J.T., Wakikawa, R., Belding-Royer, E.M., Sun, Y.: IP Address Autoconfiguration for Ad hoc Networks, draft-ietf-manetautoconf- 01.txt, Internet Engineering Task Force, MANET Working Group (November 2001)

    Google Scholar 

  8. Misra, A., Das, S., McAuley, A., Das, S.K.: Sun. Autoconfiguration, Registration and Mobility Management for Pervasive Computing. IEEE Personal Communications 08(04) (August 2001)

    Google Scholar 

  9. Mohsin, M., Prakash, R.: IP Address Assignment in a Mobile Ad Hoc Network. IEEE Milcom (2002)

    Google Scholar 

  10. Yang, H., Meng, X., Lu, S.: Self-Organized Network Layer Security in Mobile Ad Hoc Networks. In: The Proceedings of ACM Workshop on Wireless Security – 2002 (WiSe 2002) (September 2002)

    Google Scholar 

  11. Puttini, R., Me, L., de Sousa, R.: MAE – MANET Authentication Extension for Securing Routing Protocols. In: 5th IEEE International Conference on Mobile and Wireless Communications Networks (MWCN 2003), (October 2003)

    Google Scholar 

  12. Knuth, D.E.: The Art of Computer Programming, 3rd edn. Fundamental Algorithms, vol. I. Addison-Wesley, Reading (1997)

    Google Scholar 

  13. Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: The Proceeding of Seventh IEEE International Symposium on Computer and Communications, ISCC 2002 (2002)

    Google Scholar 

  14. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for MANET. In: IEEE ICNP 2001 (2001)

    Google Scholar 

  15. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network Magazine 13(6), 24–30 (1999)

    Article  Google Scholar 

  16. Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  17. Puttini, R., Percher, J.M., Me, L., Camp, O., de Sousa, R.: A Modular Architecture for a Distributed IDS for Mobile Ad Hoc Networks. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds.) ICCSA 2003. LNCS, vol. 2669, pp. 91–113. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  18. Jeong, J.-H., Cha, H.-W., Park, J.-S., Kim, H.-J.: Ad Hoc IP Address. Autoconfiguration, draft-jeong-adhoc-ip-addr-autoconf-00.txt, Internet Engineering Task Force, MANET Working Group (May 2003)

    Google Scholar 

  19. Boleng, J.: Efficient network layer addressing for mobile ad hoc networks, Tech. Rep. MCS-00-09, The Colorado School of Mines (2000)

    Google Scholar 

  20. Nesargi, S., Prakash, R.: MANETconf: Configuration of hosts in a mobile ad hoc networks. In: INFOCOM (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Buiati, F., Puttini, R., De Sousa, R. (2004). A Secure Autoconfiguration Protocol for MANET Nodes. In: Nikolaidis, I., Barbeau, M., Kranakis, E. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2004. Lecture Notes in Computer Science, vol 3158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-28634-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-28634-9_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22543-0

  • Online ISBN: 978-3-540-28634-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics