Abstract
Reliable, inexpensive, on-the-fly networks can be established using mobile ad-hoc network (MANET) technology. Such networks can be used in a wide variety of scenarios ranging from connecting powerful computers to connecting so-called “smart dust” devices. However, the core of MANET technology, the routing protocols, were never designed for the extremely low power devices that are desired for today’s applications. In this paper, we propose a new implementation of the Ad-hoc On-Demand Distance Vector routing protocol (AODV), named MoteAODV, that addresses this shortcoming. In addition, we also introduce an implementation, MoteAODV+AES, which allows for the addressing of security concerns in routing protocols on such limited devices. We also provide performance benchmarks and a comprehensive security analysis of our proposed solutions.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standard 197 (2001)
Secure Hash Standard. Federal Information Processing Standard 180-2 (2002)
Baruch Awerbuch, C.N.-R., Holmer, D., Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia (September 2002)
Buchegger, S., Boudec, J.-Y.L.: Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, Spain, January 2002, pp. 403–410. IEEE Computer Society, Los Alamitos (2002)
Cordasco, J., Wetzel, S.: An Attacker Model for MANET Routing Security. In: Proceedings of The 2nd ACM Conference on Wireless Network Security (WiSec 2009), pp. 87–93 (2009)
Crossbow Wireless Module Portfolio, http://www.xbow.com/Products/productdetails.aspx?sid=156
Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, New York (2002)
Dworkin, M.: Recommendation for Block Cipher Modes of Operation - Methods and Techniques. NIST Special Publication, 800–838A (2001)
Dworkin, M.: Recommendation for block cipher modes of operation: The CCM mode for authentication and confidentiality. NIST Special Publication, 800–838C (2004)
Fonseca, R., Gnawali, O., Jamieson, K., Kim, S., Levis, P., Woo, A.: TEP 123: Collection Tree Protocol. Technical Report 123 (2006), http://www.tinyos.net/tinyos-2.x/doc/
Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. Ad Hoc Networks I, 175–192 (2003)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: MobiCom ’02: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, New York, NY, USA, pp. 12–23. ACM Press, New York (2002)
Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad Hoc Wireless Networks. In: Mobile Computing, vol. 353. Kluwer Academic Publishers, Dordrecht (1996)
Levis, P., Patel, N., Shenker, S., Culler, D.: Trickle: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks. In: Proceedings of the First USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI), pp. 15–28 (2004)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Mobile Computing and Networking, pp. 255–265 (2000)
Meka, K., Virendra, M., Upadhyaya, S.: Trust Based Routing Decisions in Mobile Ad-hoc Networks. In: Proceedings of the Workshop on Secure Knowledge Management (SKM 2006) (2006)
Mica2 Mote Product Details, http://www.xbow.com/Products/productdetails.aspx?sid=174
TI MSP430 Microcontroller, http://www.ti.com/msp430
Papadimitratos, P., Haas, Z.: Secure Routing for Mobile Ad Hoc Networks. In: Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, CNDS (2002)
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing, RFC 3561 (July 2003)
Perkins, C., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In: ACM SIGCOMM’94 Conference on Communications Architectures, Protocols and Applications, pp. 234–244 (1994)
Perkins, C., Royer, E.: Ad-Hoc On-Demand Distance Vector Routing. In: MILCOM ’97 Panel on Ad Hoc Networks (1997)
Perrig, A., Canetti, R., Tygar, D., Song, D.: The TESLA Broadcast Authentication Protocol. Cryptobytes 5(2), 2–13 (2002)
Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: Mobile Computing and Networking, pp. 189–199 (2001)
Rivest, R.: The MD5 Message-Digest Algorithm (April 1992)
Schneier, B., Diffie, W.: Applied cryptography: protocols, algorithms, and source code in C (1996)
TelosB Mote Product Details, http://www.xbow.com/Products/productdetails.aspx?sid=252
Tews, E., Weinmann, R.-P., Pyshkin, A.: Breaking 104 Bit WEP in Less Than 60 Seconds. LNCS, pp. 188–202. Springer, Heidelberg (2008)
TinyOS Webpage, http://www.tinyos.net/
Zapata, M.G., Asokan, N.: Securing Ad Hoc Routing Protocols. In: WiSE ’02: Proceedings of the ACM workshop on Wireless security, New York, NY, USA, pp. 1–10. ACM Press, New York (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP International Federation for Information Processing
About this paper
Cite this paper
Backes, W., Cordasco, J. (2010). MoteAODV – An AODV Implementation for TinyOS 2.0. In: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (eds) Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. WISTP 2010. Lecture Notes in Computer Science, vol 6033. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12368-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-12368-9_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12367-2
Online ISBN: 978-3-642-12368-9
eBook Packages: Computer ScienceComputer Science (R0)