The routing protocols in use today operate on implicit trust among the different routers. Specifically, the distance vector routing (DVR) protocols compute routing tables in a distributed manner, based on this implicit trust. This trust model however fails to ensure the factual correctness of the routing updates, which is very critical for secure routing. We propose a neighbor update propagation model to ensure factual correctness and detect malicious activity by any subverted router. We also propose a secure DVR protocol based on this model using simple cryptographic primitives, and with minimal operational overhead.


Hash Table Distance Vector Symmetric Encryption Collusion Attack Security Guarantee 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Bellovin, S.: Security Problems in the TCP/IP Suite. In: ACM CCR, pp. 32–48 (1989)Google Scholar
  2. 2.
    NANOG Archives(wow, AS7007!),
  3. 3.
    NANOG Archives(C&W Routing Instability),
  4. 4.
    Smith, B.R., Murthy, S., Garcia-Luna-Aceves, J.J.: Securing Distance Vector Routing Protocols. In: SNDSS 1997 (1997)Google Scholar
  5. 5.
    Chakrabarti, A., Manimaran, G.: An Efficient Algorithm for Malicious Update Detection & Detection in Distance Vector Protocols. In: IEEE ICC 2003 (2003)Google Scholar
  6. 6.
    Bhargavan, K., Obradovic, D., Gunter, C.: Formal Verification of Standards for Distance Vector Routing Protocols. J. ACM 49(4), 538–576 (2002)MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Zhang, K.: Efficient Protocols for Signing Routing Messages. In: NDSS (1998)Google Scholar
  8. 8.
    Bradley, K., et al.: Detecting Disruptive Routers: A Distributed Network Monitoring Approach. In: IEEE Symp. on Security & Privacy (1998)Google Scholar
  9. 9.
    Wan, T., Kranakis, E., van Oorschot, P.C.: S-RIP: A Secure Distance Vector Routing Protocol. In: ACNS 2004 (2004)Google Scholar
  10. 10.
    Hu, Y., Johnson, D., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless AdHoc Networks. In: IEEE WMCSA 2002 (2002)Google Scholar
  11. 11.
    Hu, Y.C., Perrig, A., Johnson, D.B.: Efficient Security Mechanisms for Routing Protocols. In: NDSS 2003 (2003)Google Scholar
  12. 12.
    Avramopoulos, I., Kobayashi, H., Wang, R., Krishnamurthy, A.: Highly Secure and Efficient Routing. In: IEEE INFOCOM 2004 (2004)Google Scholar
  13. 13.
    Hendrik, C.: Routing Information Protocol. RFC 1058 (June 1988)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2006

Authors and Affiliations

  • Muthusrinivasan Muthuprasanna
    • 1
  • Govindarasu Manimaran
    • 1
  1. 1.Iowa State UniversityUSA

Personalised recommendations