Advertisement

A Secure Multicast Routing Protocol for Ad Hoc Networks with Misbehaving Nodes

  • Young-Chul Shim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3981)

Abstract

Ad hoc networks are useful in many application areas. Security is important but it is a challenging issue due to ad hoc network’s characteristics such as lack of infrastructure, communication over wireless medium, and node mobility. In this paper we present a secure multicast routing protocol for ad hoc networks. The proposed protocol makes it possible for a node to create a new multicast group and join or leave an existing group securely. It also includes a mechanism for detecting and repairing broken links securely. In addition to securely exchanging multicast packets, this paper addresses the problem of securely building and maintaining multicast trees in ad hoc networks. Moreover, the protocol guards against attacks from authorized but misbehaving nodes as well as unauthorized nodes.

Keywords

Node Mobility Parent Node Multicast Tree Multicast Group Break Link 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Royer, E.M., Perkins, C.E.: Multicast Operation of the Ad-hoc On-Demand Distance Vector Routing Protocol. In: Mobicom 1999 (1999)Google Scholar
  2. 2.
    Toh, C.-K.: Ad Hoc Mobile Wireless Network: Protocols and Systems. Prentice-Hall, Englewood Cliffs (2002)Google Scholar
  3. 3.
    Luo, H., et al.: Self-securing Ad Hoc Wireless Networks. In: 7th IEEE Symposium on computers and Communications (2002)Google Scholar
  4. 4.
    Sanzgiri, K., et al.: A Secure Routing Protocol for Ad Hoc Networks. In: ICNP (2002)Google Scholar
  5. 5.
    Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In: WMCSA (2002)Google Scholar
  6. 6.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure on-Demand Routing Protocol for Ad Hoc Networks. In: MobiCom (2002)Google Scholar
  7. 7.
    Mittra, S.: Iolus: A Framework for Scalable Secure Multicasting. In: Proc. of ACM SIGCOMM Conf. (1997)Google Scholar
  8. 8.
    Wong, C., Gouda, M., Lam, S.: Secure Group Communications using Key Graphs. In: Proc. of ACM SIGCOMM Conf. (1998)Google Scholar
  9. 9.
    Sheilds, C., Garcia-Luna-Aceves, J.J.: KHIP: A Scalable Protocol for Secure Multicast Routing. In: Proc. of ACM SIGCOMM Conf. (1999)Google Scholar
  10. 10.
    Bruschi, D., Rosti, E.: Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues. In: Mobile Networks and Applications, vol. 7 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Young-Chul Shim
    • 1
  1. 1.Department of Computer EngineeringHongik UniversityKorea

Personalised recommendations