Abstract
Ad hoc networks are useful in a variety of applications, particularly in areas where creating a network infrastructure is not cost effective or when timeliness is important, such as military or rescue operations. The sensitivity of these uses for ad hoc networks makes routing security an important consideration. Unlike traditional networks, in ad hoc networks each node participates in routing functions. A malicious node could introduce serious disruptions in the network by advertising false routing information or not participating in packet forwarding. We introduce modifications to the proposed AODV-S routing protocol to reduce energy consumption associated with the security solution. Both protocols are simulated and the performance is compared with AODV. These results are presented and analyzed. Additionally, the application of ad hoc networks and the proposed AODV-SMS protocol in an information sharing environment is discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Tanenbaum, A.S.: Computer Networks, 4th edn. Prentice Hall, Englewood Cliffs (2003)
Corson, S., Macker, J.: Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. In: IETF MANET RFC2501 (January 1999)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255–265 (2000)
Yi, S., Naldurg, P., Kravets, R.: Security-Aware Ad Hoc Routing for Wireless Networks. Poster presentation at ACM Symposium on Mobile Ad Hoc Networking and Computing, October 2001. University of Illinois at Urbana-Champaign Technical Report UIUCDCS-R-2001-2241 (August 2001)
Royer, E.M., Toh, C.-K.: A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. In: IEEE Personal Communications (April 1999)
Broch, J.D.A.M., Johnson, D.B., Hu, Y.C., Jetcheva, J.: A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In: Proceedings of the ACM/IEEE MobiCom, pp. 85–97 (October 1998)
Manzoni, P., Cano, J.-C.: A Performance Comparison of Energy Consumption for Mobile Ad Hoc Network Routing Protocols. In: Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 57–64 (2000)
Perkins, C.E., Royer, E.M.: Ad hoc On-Demand Distance Vector Routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100 (February 1999)
Perkins, C.E., Belding-Royer, E., Das, S.: Ad Hoc On-Demand Distance Vector (AODV) Routing. IETF MENET RFC3561 (July 2003)
Molva, R., Michiardi, P.: Security in ad hoc networks. In: Conti, M., Giordano, S., Gregori, E., Olariu, S. (eds.) PWC 2003. LNCS, vol. 2775, pp. 756–775. Springer, Heidelberg (2003)
Law, Y.W., Dulman, S., Etalle, S., Havinga, P.: Assessing Security-Critical Energy-Efficient Sensor Networks. TR-CTIT-02-18, Department of Computer Science, University of Twente (2002)
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols (2002)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: The 8th ACM International Conference on Mobile Computing and Networking (September 2002)
Buchegger, S., Le Boudec, J.-Y.: Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In: 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing
Zapata, M.G., Asokan, N.: Securing Ad Hoc Routing Protocols. In: Proceedings of the ACM Workshop on Wireless Security (September 2002)
Yang, H., Meng, X., Lu, S.: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks. In: Proceedings of the ACM Workshop on Wireless Security (September 2002)
Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: The 7th IEEE Symposium on Computers and Communications (2002)
Shamir, A.: How to Share A Secret. Communications of the ACM (November 1979)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks. In: Proceedings of IEEE ICNP (2001)
Feeney, L., Nilsson, M.: Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment. In: Proceedings of IEEE INFOCOM Anchorage, AK (2001)
Hurson, A.R., Bright, M.W.: Multidatabase Systems: An advanced Concept in Handling Distributed Data. Advances in Computers 32 (1991)
Lim, J.B., Hurson, A.R.: Transaction processing in a mobile, multi-database environment. Multimedia Tools and Applications 15(2), 161–185 (2001)
Haridas, H.A.R., Hurson, Jiao, Y.: Security Aspects of Wireless Heterogeneous Databases – Protocol, Performance, and Energy Analysis. In: Proceedings of the 2003 International Conference on Parallel Processing Workshops, pp. 417–424 (October 2003)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks. In: Proceedings of IEEE ICNP (2001)
Das, S.R., Perkins, C.E., Royer, E.M.: Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Tel Aviv, Israel, pp. 3–12 (March 2000)
Khalili, A., Katz, J., Arbaugh, W.A.: Toward Secure Key Distribution in Truly Ad-Hoc Networks. In: IEEE Workshop on Security and Assurance in Ad-Hoc Networks (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ploskonka, J.A., Hurson, A.R. (2006). Self-monitoring Security in Ad Hoc Routing. In: Kunz, T., Ravi, S.S. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2006. Lecture Notes in Computer Science, vol 4104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11814764_20
Download citation
DOI: https://doi.org/10.1007/11814764_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37246-2
Online ISBN: 978-3-540-37248-6
eBook Packages: Computer ScienceComputer Science (R0)