Skip to main content

SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5060))

Abstract

In hostile Ad hoc network, the possibility of being attacked or attacking others can’t be avoided. Most current intrusion detection systems and secure routing protocols only focus on concrete attacking behaviors while neglecting the underlying attacking threat. So it’s inevitable to choose malicious nodes during routing establishment. To construct a secure multipath route, we present SEMAP, a secure enhancement mechanism based on Attacking Point (AP) which converts the possibility of security threat to a concrete metric. AP is a description of security status of a node. AP of a node can be easily extended to that of link, path and path set, which provides an important reference in route selection. Our design can exclude the nodes that will be the objects of adversaries from the network before actual routing process. Simulation results show that SEMAP provides an effective security enhancement without compromising the efficiency of original routing protocol.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wei, D.: Research on Intrusion Detection in Ad Hoc Network, PHD thesis, College of Automation ChongQin University, 5 (2006)

    Google Scholar 

  2. Zhang, Y., Lee, W., Huang, Y.: Intrusion detection technqiues for mobile wireless networks. ACM Wireless Networks 5, 545–556 (2003)

    Article  Google Scholar 

  3. Fei, W., Yijun, M., Benxiong, H.: COSR: Cooperative On-Demand Secure Route Protocol in MANET. In: Proceedings of ISCIT 2006, pp. 890–893 (2006)

    Google Scholar 

  4. Guerrero, M.: Securing ad hoc routing protocols. IETF Internet Draft, 06 (2006)

    Google Scholar 

  5. Seung, Y., Prasad, N., Robin, K.: Security-aware ad hoc routing for wireless networks. In: Proceedings of MobiHoc 2001, pp. 299–302 (2001)

    Google Scholar 

  6. Yih-Chun, H., Adrian, P., Johnson David, B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 11(1-2), 21–38 (2005)

    Article  Google Scholar 

  7. Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: Commun. Networks and Distributed Systems Modeling and Simulation Conference (CNDS) (2002)

    Google Scholar 

  8. Aad, I., Hubaux, J.-P., Knightly, E.W.: Denial of Service Resilience in Ad Hoc Networks. In: ACM MOBICOM, pp. 202–215 (2004)

    Google Scholar 

  9. Lee, S.J., Gerla, M.: Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks. In: Proceedings of the IEEE ICC, pp. 3201–3205 (2001)

    Google Scholar 

  10. Nasipuri,, Das, S.R.: On-Demand Multipath Routing for Mobile Ad Hoc Networks. In: Proceedings of IC3N (1999)

    Google Scholar 

  11. Ye, Z., Krishnamurthy, S.V., Tripathi, S.K.: A Framework for Reliable Routing in Mobile Ad Hoc Networks. In: IEEE INFOCOM (2003)

    Google Scholar 

  12. Marina, M.K., Das, S.R.: On-demand Multipath Distance Vector Routing in Ad Hoc Networks. In: Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP) (2001)

    Google Scholar 

  13. Wang, F., Huang, C., Zhao, J., Rong, C.: IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks. In: Proceeding of The IEEE 22nd International Conference on Advanced Information Networking and Applications, AINA 2008 (2008)

    Google Scholar 

  14. Goyal., D., Caffery Jr., J.: Partitioning Avoidance in Mobile Ad hoc Networks Using Network Survivability. In: Proceedings ISCC 2002, pp. 553–558 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Chunming Rong Martin Gilje Jaatun Frode Eika Sandnes Laurence T. Yang Jianhua Ma

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lu, Z., Huang, C., Wang, F., Rong, C. (2008). SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69295-9_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69294-2

  • Online ISBN: 978-3-540-69295-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics