Skip to main content

Self-organized Security Architecture for MANET

  • Conference paper
Intelligent Information Technology (CIT 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3356))

Included in the following conference series:

  • 778 Accesses

Abstract

An ad hoc Network is a new generation of network offering unrestricted mobility without any underlying infrastructure. In this kind of network, all the nodes share the responsibility of network formation and management. Fundamental characteristics of an ad hoc network, such as open medium, dynamic topology, dynamic cooperation and constrained capabilities lead to vulnerabilities. Unlike wired network, an ad hoc network does not have a clear line of defense, and every node must be prepared for encounters with an adversary. This paper proposes a three-layer security architecture for ad hoc networks, that provides self-organized distributed security, and authenticated, security aware routing. The first layer in the design performs the operation of a certification server such as issuing, renewal and revocation of certificate using the principle of secret sharing and threshold cryptography. Each certificate issued by this layer has a certain period of validity. Nodes should renew their tokens before expiration. Each node also accumulates its credit whenever it renews the token. The second layer provides authenticated and security aware routing using the token issued by the layer 1. Layer 3 consists of a modified version of reverse labeling restriction protocol that effectively handles internal attacks. This model has been simulated and is found to provide security with negligible overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ramanathan, R., Redi BBN Technologies, Jason: A brief overview of ad hoc networks challenges and directions. IEEE communication magazine, 20–22 (May 2002)

    Google Scholar 

  2. Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

  3. Yang, H., Meng, X., Lu, S.: Self-organized network-layer security in mobile ad hoc networks. In: Proceedings of the ACM workshop on Wireless security, September 2002, pp. 11–20 (2002)

    Google Scholar 

  4. Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: Self-securing Ad- Hoc Wireless Networks. In: IEEE ISCC (IEEE Symposium on Computers and Communications) 2002, Italy (July 2002)

    Google Scholar 

  5. Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L., et al.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: Proc. IEEE ICNP, pp. 251–260 (2001)

    Google Scholar 

  6. Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  7. Damgard, I.B., Koprowski, M.: Practical threshold RSA signatures without a trusted dealer, Research Series RS-00-30, BRICS, Department of Computer Science, University of Aarhus, pp. 14 (November 2000)

    Google Scholar 

  8. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proceedings of the Sixth ACM International Conference on Mobile Networking and Computing (August 2000) (Mobicom 2000) (Boston)

    Google Scholar 

  9. Li, W., Agarwal, P.: Routing Security in Wireless Ad hoc network. IEEE communication magazine, 70–75 (October 2002)

    Google Scholar 

  10. Dahill, B., Levine, B., Royer, E., Shields, C.: A secure routing protocol for ad hoc net works, Technical Report UM-CS-2001-037, Electrical Engineering and Computer Science, University of Michigan (August 2001)

    Google Scholar 

  11. Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking Mobicom 2002 (2002)

    Google Scholar 

  12. Yi, S., Naldurg, P., Seungyi, R.K., et al.: A Security-Aware Routing Protocol for Wireless Hoc Networks. In: Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing, pp. 299–302 (2001)

    Google Scholar 

  13. Bhargava, B.: Intruder Identification in Ad Hoc Networks, CERIAS Security Center and Department of Computer Sciences Purdue University, research proposal (2002)

    Google Scholar 

  14. Awerbuch, B., Holmer, D., NitaRotaru, C., Rubens, H.: An On Demand Secure Routing Protocol Resilient Byzantine Failures. In: Proceedings of the ACM workshop on Wireless security 2002, Department of Computer Science Johns Hopkins University, Atlanta, pp. 21–30 (2002)

    Google Scholar 

  15. http://pcl.cs.ucla.edu/projects/glomosim

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gnana Durai, P.P., Parthasarathy, R. (2004). Self-organized Security Architecture for MANET. In: Das, G., Gulati, V.P. (eds) Intelligent Information Technology. CIT 2004. Lecture Notes in Computer Science, vol 3356. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30561-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30561-3_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24126-3

  • Online ISBN: 978-3-540-30561-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics