Abstract
Presently, the main concern of ad hoc routing protocols is no longer to find an optimal route to a given destination but to find the safe route free from malicious attackers. Several secure ad hoc routing protocols proposed, in the literature, are based on public key cryptography which drawback is to consume much more resources and decrease consequently network performances. In this paper, we propose a secure routing scheme for the DSR protocol. The proposed scheme combines the hash chains and digital signatures to provide a high level of security while reducing the costs of hop-by-hop signature generation and verification. The proposed protocol is analyzed using the NS-2 simulator.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Ács, G., Buttyán, L., Vajda, I.: Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing 5(11), 1533–1546 (2006)
Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., Rubens, H.: ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans. Inf. Syst. Secur. 10(3) (2007)
Awerbuch, B., Scheideler, C.: Robust random number generation for peer-to-peer systems. Theoretical Computer Science 410(6-7), 453–466 (2009)
Burmester, M., De Medeiros, B.: On the Security of Route Discovery in MANETs. IEEE Transactions on Mobile Computing 8(9), 1180–1188 (2009)
Buttyán, L., Vajda, I.: Towards provable security for ad hoc routing protocols. In: Setia, S., Swarup, V. (eds.) SASN, pp. 94–105. ACM (2004)
Cerri, D., Ghioni, A.: Securing AODV: The A-SAODV Secure Routing Prototype. IEEE Communications Magazine (February 2008)
Curtmola, R., Nita-Rotaru, C.: BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks. IEEE Transactions on Mobile Computing 8(4), 445–459 (2009)
Eichler, S., Roman, C.: Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC. Technical Report: LKN-TR-2. Technische Universität München, Germany (2006)
Galice, S., Minier, M., Ubéda, S.: A Trust Protocol for Community Collaboration. In: Etalle, S., Marsh, S. (eds.) IFIPTM. IFIP, vol. 238, pp. 169–184. Springer, Boston (2007)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Akyildiz, I.F., Lin, J.Y.-B., Jain, R., Bharghavan, V., Campbell, A.T. (eds.) MOBICOM, pp. 12–23. ACM (2002)
Hu, Y.-C., Perrig, A., Johnson, D.B.: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks 11(1-2), 21–38 (2005)
Jin, L., Zhang, Z., Zhou, H.: Performance comparison of AODV, SAODV and FLSL routing protocols in mobile ad hoc network. In: 4th IEEE Consumer Communications and Networking Conference, CCNC 2007, pp. 479–483 (January 2007)
Jung, S., Lee, B., Talipov, E., Ahn, M.W., Kim, C.: Effects of Valid Source-Destination Edges for Node-Disjoint Multipaths on AD HOC Networks. In: MSV 2008, Las Vegas, USA, pp. 308–313 (2008)
Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. Mobile Computing, 153–181 (1996)
Johnson, D.B., Maltz, D.A., Hu, Y.C.: IETF RFC4728: The dynamic source routing protocol (DSR) for mobile ad hoc networks (February 2007)
Lamport, L.: Password Authentication with Insecure Communication. Communication of the ACM 24, 770–772 (1981)
Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: URSA: Ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transactions on Networking 12(6), 1049–1063 (2004)
Mallouli, W., Wehbi, B., Cavalli, A.R.: Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking. In: The 7th International Conference on AD-HOC Networks & Wireless, Sophia Antipolis, France, September 10-12 (2008)
Mishra, A.: Security and quality of service in ad hoc wireless network, pp. 3–106. Cambridge University Press, New York (2008)
NS Manual. VINT Project (2008), http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf
Naldurg, S., Yi, P., Kravets, R.: Security aware ad hoc routing for wireless networks. In: 2nd ACM Int. Symp. on Mobile Ad Hoc Networking & Computing, Long Beach, pp. 299–302. ACM Publisher, USA (2001)
Ning, P., Sun, K.: How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols. Ad Hoc Networks 3(6), 795–819 (2005)
Orset, J.-M., Alcalde, B., Cavalli, A.: An EFSM-Based Intrusion Detection System for Ad Hoc Networks. In: Peled, D.A., Tsay, Y.-K. (eds.) ATVA 2005. LNCS, vol. 3707, pp. 400–413. Springer, Heidelberg (2005)
Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: Proceedings of the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, USA, pp. 193–204 (January 2002)
Pirzada, A., McDonald, C., Datta, A.: Performance Comparison of Trust-Based Reactive Routing Protocols. IEEE Transactions on Mobile Computing 5(6) (June 2006)
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: Authenticated routing for ad hoc networks. In: 10th IEEE International Conference on Network Protocols, Paris, France (2002)
Talipov, E., Jin, D., Jung, J., Ha, I., Choi, Y., Kim, C.: Path Hopping Based on Reverse AODV for Security. In: Kim, Y.-T., Takano, M. (eds.) APNOMS 2006. LNCS, vol. 4238, pp. 574–577. Springer, Heidelberg (2006)
Tsaur, W.-J., Pai, H.-T.: A New Security Scheme for On-Demand Source Routing in Mobile Ad Hoc Networks. In: IWCMC 2007, Honolulu, Hawaii, USA, August 12-16, pp. 577–582 (2007)
Tseng, C.-Y.H.: Distributed Intrusion Detection Models For Mobile Ad Hoc Networks. PhD Thesis, University of California (2006)
Weimerskirch, A., Westhoff, D.: Zero Common-Knowledge Authentication for Pervasive Networks. In: Matsui, M., Zuccherato, R. (eds.) SAC 2003. LNCS, vol. 3006, pp. 73–87. Springer, Heidelberg (2004)
Zapata, M.G.: Secure Ad hoc on Demand Distance Vector (SAODV) Routing. Mobile Ad Hoc Networking Working Group, Internet Draft (September 2005)
Zapata, M.G.: Key Management and Delayed Verification for Ad Hoc Networks. Journal of High Speed Networks 15(1), 93–109 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bouabana-Tebibel, T. (2012). Hash Chains at the Basis of a Secure Reactive Routing Protocol. In: Chen, L., Yung, M., Zhu, L. (eds) Trusted Systems. INTRUST 2011. Lecture Notes in Computer Science, vol 7222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32298-3_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-32298-3_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32297-6
Online ISBN: 978-3-642-32298-3
eBook Packages: Computer ScienceComputer Science (R0)