Abstract
Secure routing and data transmission has stimulated wide interest in Ad Hoc network research since it is more vulnerable to attacks due to its structural characteristics. Several efficient and secure schemes have been proposed to protect the network from external attacks. However, they still lack very efficient ways to detect and resist internal attacks. Here we proposed a secure data transmission protocol (SDTP) based on the Reed-Solomon error-correct coding to achieve secure data transmission in a Byzantine attack-existing environment. This protocol can distinguish malicious behaviors from transmission errors and locate the malicious node accurately. The algorithms used in this protocol also apply to secure routing protocols.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Hu, Y., Perrig, A., Johnson, D.B.: Ariadne: a secure on demand routing protocol for ad hoc networks. In: Proc. of ACM Mobicom, Atlanta, GA (Sep. 2002)
Hu, Y., Johnson, D.B., Perrig, A.: SEAD: Secure efficient distance vector routing for mobile Ad Hoc networks. In: Proc. of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), Calicoon, NY, Jun. 2002, IEEE, Los Alamitos (2002)
Dahill, B., et al.: ARAN: A Secure Routing Protocol for Ad Hoc Networks. Umass Tech. Report 02-32 (2002)
Sanzgiri, K., et al.: A Secure Routing Protocol for Ad Hoc Networks. In: 10th IEEE Intl. Conf. on Network Protocols (ICNP02) (November 2002)
Cheung, S., Levitt, K.: Protecting Routing Infrastructures from Denial of Service using Cooperative Intrusion Detection. In: Workshop on New Security Paradigms (1997)
Goodrich, M.T.: Efficient and Secure Network Routing Algorithms. Provisional patent filing Jan. 2001, http://www.cs.jhu.edu/goodrich/cgc/pubs/routing.pdf
Buchegger, S., Boudec, J.-Y.L.: Performance analysis of the CONFIDANT protocol. In: Proc. of the 3rd ACM international symposium on Mobile ad hoc networking & computing, Lausanne, Switzerland (Jun. 2002)
Buchegger, S., Le Boudec, J.-Y.: A robust reputation system for mobile ad-hoc networks. EPFL Technical report No. IC/2003/50 (July 2003)
Awerbuch, B., et al.: An Ondemand Secure Routing Protocol Resilient to Byzantine Failures. In: ACM Workshop on Wireless Security (WiSe) (Sept. 2002)
Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. SIAM Journal of Applied Math. 8, 300–304 (1960)
Reed, I.S., Chen, X.: Error-Control Coding for Data Networks. Kluwer Academic Publishers, Norwell (1999)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory 22, 644–654 (1976)
Yu, B., Yang, M., Wang, Z.: Identify Abnormal Packet Loss in Selective Forwarding Attacks. Chinese Journal of Computer 29(9), 1542–1552 (2006)
Mahesh, K.M., Samir, R.D.: Ad hoc on-demand multipath distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review 6(3), 92–93 (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Lu, S., Li, J., Liu, Z., Cui, G. (2007). A Secure Data Transmission Protocol for Mobile Ad Hoc Networks. In: Yang, C.C., et al. Intelligence and Security Informatics. PAISI 2007. Lecture Notes in Computer Science, vol 4430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71549-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-71549-8_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71548-1
Online ISBN: 978-3-540-71549-8
eBook Packages: Computer ScienceComputer Science (R0)