Skip to main content

Self-monitoring Security in Ad Hoc Routing

  • Conference paper
Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4104))

Included in the following conference series:

Abstract

Ad hoc networks are useful in a variety of applications, particularly in areas where creating a network infrastructure is not cost effective or when timeliness is important, such as military or rescue operations. The sensitivity of these uses for ad hoc networks makes routing security an important consideration. Unlike traditional networks, in ad hoc networks each node participates in routing functions. A malicious node could introduce serious disruptions in the network by advertising false routing information or not participating in packet forwarding. We introduce modifications to the proposed AODV-S routing protocol to reduce energy consumption associated with the security solution. Both protocols are simulated and the performance is compared with AODV. These results are presented and analyzed. Additionally, the application of ad hoc networks and the proposed AODV-SMS protocol in an information sharing environment is discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tanenbaum, A.S.: Computer Networks, 4th edn. Prentice Hall, Englewood Cliffs (2003)

    Google Scholar 

  2. Corson, S., Macker, J.: Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. In: IETF MANET RFC2501 (January 1999)

    Google Scholar 

  3. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255–265 (2000)

    Google Scholar 

  4. Yi, S., Naldurg, P., Kravets, R.: Security-Aware Ad Hoc Routing for Wireless Networks. Poster presentation at ACM Symposium on Mobile Ad Hoc Networking and Computing, October 2001. University of Illinois at Urbana-Champaign Technical Report UIUCDCS-R-2001-2241 (August 2001)

    Google Scholar 

  5. Royer, E.M., Toh, C.-K.: A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. In: IEEE Personal Communications (April 1999)

    Google Scholar 

  6. Broch, J.D.A.M., Johnson, D.B., Hu, Y.C., Jetcheva, J.: A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In: Proceedings of the ACM/IEEE MobiCom, pp. 85–97 (October 1998)

    Google Scholar 

  7. Manzoni, P., Cano, J.-C.: A Performance Comparison of Energy Consumption for Mobile Ad Hoc Network Routing Protocols. In: Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 57–64 (2000)

    Google Scholar 

  8. Perkins, C.E., Royer, E.M.: Ad hoc On-Demand Distance Vector Routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100 (February 1999)

    Google Scholar 

  9. Perkins, C.E., Belding-Royer, E., Das, S.: Ad Hoc On-Demand Distance Vector (AODV) Routing. IETF MENET RFC3561 (July 2003)

    Google Scholar 

  10. Molva, R., Michiardi, P.: Security in ad hoc networks. In: Conti, M., Giordano, S., Gregori, E., Olariu, S. (eds.) PWC 2003. LNCS, vol. 2775, pp. 756–775. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Law, Y.W., Dulman, S., Etalle, S., Havinga, P.: Assessing Security-Critical Energy-Efficient Sensor Networks. TR-CTIT-02-18, Department of Computer Science, University of Twente (2002)

    Google Scholar 

  12. Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols (2002)

    Google Scholar 

  13. Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: The 8th ACM International Conference on Mobile Computing and Networking (September 2002)

    Google Scholar 

  14. Buchegger, S., Le Boudec, J.-Y.: Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In: 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing

    Google Scholar 

  15. Zapata, M.G., Asokan, N.: Securing Ad Hoc Routing Protocols. In: Proceedings of the ACM Workshop on Wireless Security (September 2002)

    Google Scholar 

  16. Yang, H., Meng, X., Lu, S.: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks. In: Proceedings of the ACM Workshop on Wireless Security (September 2002)

    Google Scholar 

  17. Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: The 7th IEEE Symposium on Computers and Communications (2002)

    Google Scholar 

  18. Shamir, A.: How to Share A Secret. Communications of the ACM (November 1979)

    Google Scholar 

  19. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks. In: Proceedings of IEEE ICNP (2001)

    Google Scholar 

  20. Feeney, L., Nilsson, M.: Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment. In: Proceedings of IEEE INFOCOM Anchorage, AK (2001)

    Google Scholar 

  21. Hurson, A.R., Bright, M.W.: Multidatabase Systems: An advanced Concept in Handling Distributed Data. Advances in Computers 32 (1991)

    Google Scholar 

  22. Lim, J.B., Hurson, A.R.: Transaction processing in a mobile, multi-database environment. Multimedia Tools and Applications 15(2), 161–185 (2001)

    Article  MATH  Google Scholar 

  23. Haridas, H.A.R., Hurson, Jiao, Y.: Security Aspects of Wireless Heterogeneous Databases – Protocol, Performance, and Energy Analysis. In: Proceedings of the 2003 International Conference on Parallel Processing Workshops, pp. 417–424 (October 2003)

    Google Scholar 

  24. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks. In: Proceedings of IEEE ICNP (2001)

    Google Scholar 

  25. http://www.isi.edu/nsnam/ns/

  26. Das, S.R., Perkins, C.E., Royer, E.M.: Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Tel Aviv, Israel, pp. 3–12 (March 2000)

    Google Scholar 

  27. Khalili, A., Katz, J., Arbaugh, W.A.: Toward Secure Key Distribution in Truly Ad-Hoc Networks. In: IEEE Workshop on Security and Assurance in Ad-Hoc Networks (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ploskonka, J.A., Hurson, A.R. (2006). Self-monitoring Security in Ad Hoc Routing. In: Kunz, T., Ravi, S.S. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2006. Lecture Notes in Computer Science, vol 4104. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11814764_20

Download citation

  • DOI: https://doi.org/10.1007/11814764_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37246-2

  • Online ISBN: 978-3-540-37248-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics