Abstract
An ad hoc Network is a new generation of network offering unrestricted mobility without any underlying infrastructure. In this kind of network, all the nodes share the responsibility of network formation and management. Fundamental characteristics of an ad hoc network, such as open medium, dynamic topology, dynamic cooperation and constrained capabilities lead to vulnerabilities. Unlike wired network, an ad hoc network does not have a clear line of defense, and every node must be prepared for encounters with an adversary. This paper proposes a three-layer security architecture for ad hoc networks, that provides self-organized distributed security, and authenticated, security aware routing. The first layer in the design performs the operation of a certification server such as issuing, renewal and revocation of certificate using the principle of secret sharing and threshold cryptography. Each certificate issued by this layer has a certain period of validity. Nodes should renew their tokens before expiration. Each node also accumulates its credit whenever it renews the token. The second layer provides authenticated and security aware routing using the token issued by the layer 1. Layer 3 consists of a modified version of reverse labeling restriction protocol that effectively handles internal attacks. This model has been simulated and is found to provide security with negligible overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ramanathan, R., Redi BBN Technologies, Jason: A brief overview of ad hoc networks challenges and directions. IEEE communication magazine, 20–22 (May 2002)
Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network 13(6), 24–30 (1999)
Yang, H., Meng, X., Lu, S.: Self-organized network-layer security in mobile ad hoc networks. In: Proceedings of the ACM workshop on Wireless security, September 2002, pp. 11–20 (2002)
Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: Self-securing Ad- Hoc Wireless Networks. In: IEEE ISCC (IEEE Symposium on Computers and Communications) 2002, Italy (July 2002)
Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L., et al.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: Proc. IEEE ICNP, pp. 251–260 (2001)
Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)
Damgard, I.B., Koprowski, M.: Practical threshold RSA signatures without a trusted dealer, Research Series RS-00-30, BRICS, Department of Computer Science, University of Aarhus, pp. 14 (November 2000)
Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proceedings of the Sixth ACM International Conference on Mobile Networking and Computing (August 2000) (Mobicom 2000) (Boston)
Li, W., Agarwal, P.: Routing Security in Wireless Ad hoc network. IEEE communication magazine, 70–75 (October 2002)
Dahill, B., Levine, B., Royer, E., Shields, C.: A secure routing protocol for ad hoc net works, Technical Report UM-CS-2001-037, Electrical Engineering and Computer Science, University of Michigan (August 2001)
Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking Mobicom 2002 (2002)
Yi, S., Naldurg, P., Seungyi, R.K., et al.: A Security-Aware Routing Protocol for Wireless Hoc Networks. In: Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing, pp. 299–302 (2001)
Bhargava, B.: Intruder Identification in Ad Hoc Networks, CERIAS Security Center and Department of Computer Sciences Purdue University, research proposal (2002)
Awerbuch, B., Holmer, D., NitaRotaru, C., Rubens, H.: An On Demand Secure Routing Protocol Resilient Byzantine Failures. In: Proceedings of the ACM workshop on Wireless security 2002, Department of Computer Science Johns Hopkins University, Atlanta, pp. 21–30 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gnana Durai, P.P., Parthasarathy, R. (2004). Self-organized Security Architecture for MANET. In: Das, G., Gulati, V.P. (eds) Intelligent Information Technology. CIT 2004. Lecture Notes in Computer Science, vol 3356. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30561-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-540-30561-3_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24126-3
Online ISBN: 978-3-540-30561-3
eBook Packages: Computer ScienceComputer Science (R0)