Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)

  • Tao Wan
  • Evangelos Kranakis
  • Paul C. van Oorschot
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3269)

Abstract

A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols (e.g., AODV, DSDV, etc) have been proposed for MANETs. However, most assume that nodes are trustworthy and cooperative. Thus, they are vulnerable to a variety of attacks. We propose a secure routing protocol based on DSDV, namely S-DSDV, in which a well-behaved node can successfully detect a malicious routing update with any sequence number fraud (larger or smaller) and any distance fraud (shorter, same, or longer) provided no two nodes are in collusion. We compare security properties and efficiency of S-DSDV with superSEAD. Our analysis shows that S-DSDV-R, a variation of S-DSDV with a risk window similar to that of superSEAD, offers better security than superSEAD with less network overhead.

Keywords

DSDV Routing Security Wireless Security Security Analysis 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: Proc. of WiSe 2002 (September 2002)Google Scholar
  2. 2.
    Barbir, A., Murphy, S., Yang, Y.: Generic Threats to Routing Protocols. Internet Draft (April 13, 2004) (work in progress)Google Scholar
  3. 3.
    Bellovin, S.: Security Problems in the TCP/IP Protocol Suite. ACM Computer Communications Review 19(2), 32–48 (1989)CrossRefGoogle Scholar
  4. 4.
    Fall, K., Varadhan, K. (eds.): The ns Manual (formerly ns Notes and Documentation) (April 14, 2002), http://www.isi.edu/nsnam/ns/doc/index.html
  5. 5.
    Garcia-Luna-Aceves, J.J., Murthy, S.: A Loop-Free Algorithm Based on Predecessor Information. In: Proceedings of IEEE INFOCOM 1995, Boston, MA, USA (April 1995)Google Scholar
  6. 6.
    Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proc. of MOBICOM 2002 (September 2002)Google Scholar
  7. 7.
    Hu, Y.C., Johnson, D.B., Perrig, A.: Secure Efficient Distance Vector Routing Protocol in Mobile Wireless Ad Hoc Networks. In: Proc. of WMCSA 2002 (June 2002)Google Scholar
  8. 8.
    Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. Ad Hoc Networks Journal 1, 175–192 (2003)CrossRefGoogle Scholar
  9. 9.
    Just, M., Kranakis, E., Wan, T.: Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks. In: Proc. of ADHOCNOW 2003. LNCS, vol. 2856, pp. 151–163. Springer, Heidelberg (2003)Google Scholar
  10. 10.
    Malkin, G.: RIP Version 2. RFC 2453 (standard) (November 1998)Google Scholar
  11. 11.
    Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proc. of MOBICOMM 2000 (August 2000)Google Scholar
  12. 12.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefGoogle Scholar
  13. 13.
    Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In: Proc. of the SIGCOMM 1994 (August 1994)Google Scholar
  14. 14.
    Rekhter, Y., Li, T.: A Border Gateway Protocol 4 (BGP-4), RFC 1771 (March 1995)Google Scholar
  15. 15.
    Rivest, R.: The MD5 Message-Digest Algorithm, RFC 1321 (April 1992)Google Scholar
  16. 16.
    Smith, B.R., Murphy, S., Garcia-Luna-Aceves, J.J.: Securing Distance-Vector Routing Protocols. In: Proc. of NDSS 1997, San Diego, USA (February 1997)Google Scholar
  17. 17.
    Venkatraman, L., Agrawal, D.P.: Strategies for Enhancing Routing Security in Protocols for Mobile Ad Hoc Networks. J. of Parallel Distributed Comp. 63(2), 214–227 (2003)MATHCrossRefGoogle Scholar
  18. 18.
    Wan, T., Kranakis, E., van Oorschot, P.C.: S-RIP: A Secure Distance Vector Routing Protocol. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 103–119. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  19. 19.
    Zapata, M.G., Asokan, N.: Securing Ad Hoc Routing Protocols. In: Proceedings of the ACM Workshop on Wireless Security, WiSe 2002 (September 2002)Google Scholar
  20. 20.
    Zhang, Y.G., Lee, W., Huang, Y.A.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. of MOBICOM 2000 (August 2000)Google Scholar
  21. 21.
    Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network Magazine 13(6) (November/December 1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Tao Wan
    • 1
  • Evangelos Kranakis
    • 1
  • Paul C. van Oorschot
    • 1
  1. 1.School of Computer ScienceCarleton UniversityOttawaCanada

Personalised recommendations