Advertisement

Self-monitoring Security in Ad Hoc Routing

  • J. A. Ploskonka
  • A. R. Hurson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4104)

Abstract

Ad hoc networks are useful in a variety of applications, particularly in areas where creating a network infrastructure is not cost effective or when timeliness is important, such as military or rescue operations. The sensitivity of these uses for ad hoc networks makes routing security an important consideration. Unlike traditional networks, in ad hoc networks each node participates in routing functions. A malicious node could introduce serious disruptions in the network by advertising false routing information or not participating in packet forwarding. We introduce modifications to the proposed AODV-S routing protocol to reduce energy consumption associated with the security solution. Both protocols are simulated and the performance is compared with AODV. These results are presented and analyzed. Additionally, the application of ad hoc networks and the proposed AODV-SMS protocol in an information sharing environment is discussed.

Keywords

Mobile Node Secret Share Malicious Node Packet Forwarding Packet Drop 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Tanenbaum, A.S.: Computer Networks, 4th edn. Prentice Hall, Englewood Cliffs (2003)Google Scholar
  2. 2.
    Corson, S., Macker, J.: Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. In: IETF MANET RFC2501 (January 1999)Google Scholar
  3. 3.
    Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255–265 (2000)Google Scholar
  4. 4.
    Yi, S., Naldurg, P., Kravets, R.: Security-Aware Ad Hoc Routing for Wireless Networks. Poster presentation at ACM Symposium on Mobile Ad Hoc Networking and Computing, October 2001. University of Illinois at Urbana-Champaign Technical Report UIUCDCS-R-2001-2241 (August 2001)Google Scholar
  5. 5.
    Royer, E.M., Toh, C.-K.: A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. In: IEEE Personal Communications (April 1999)Google Scholar
  6. 6.
    Broch, J.D.A.M., Johnson, D.B., Hu, Y.C., Jetcheva, J.: A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In: Proceedings of the ACM/IEEE MobiCom, pp. 85–97 (October 1998)Google Scholar
  7. 7.
    Manzoni, P., Cano, J.-C.: A Performance Comparison of Energy Consumption for Mobile Ad Hoc Network Routing Protocols. In: Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 57–64 (2000)Google Scholar
  8. 8.
    Perkins, C.E., Royer, E.M.: Ad hoc On-Demand Distance Vector Routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100 (February 1999)Google Scholar
  9. 9.
    Perkins, C.E., Belding-Royer, E., Das, S.: Ad Hoc On-Demand Distance Vector (AODV) Routing. IETF MENET RFC3561 (July 2003)Google Scholar
  10. 10.
    Molva, R., Michiardi, P.: Security in ad hoc networks. In: Conti, M., Giordano, S., Gregori, E., Olariu, S. (eds.) PWC 2003. LNCS, vol. 2775, pp. 756–775. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Law, Y.W., Dulman, S., Etalle, S., Havinga, P.: Assessing Security-Critical Energy-Efficient Sensor Networks. TR-CTIT-02-18, Department of Computer Science, University of Twente (2002)Google Scholar
  12. 12.
    Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols (2002)Google Scholar
  13. 13.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: The 8th ACM International Conference on Mobile Computing and Networking (September 2002)Google Scholar
  14. 14.
    Buchegger, S., Le Boudec, J.-Y.: Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In: 10th Euromicro Workshop on Parallel, Distributed and Network-based ProcessingGoogle Scholar
  15. 15.
    Zapata, M.G., Asokan, N.: Securing Ad Hoc Routing Protocols. In: Proceedings of the ACM Workshop on Wireless Security (September 2002)Google Scholar
  16. 16.
    Yang, H., Meng, X., Lu, S.: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks. In: Proceedings of the ACM Workshop on Wireless Security (September 2002)Google Scholar
  17. 17.
    Luo, H., Zerfos, P., Kong, J., Lu, S., Zhang, L.: Self-securing Ad Hoc Wireless Networks. In: The 7th IEEE Symposium on Computers and Communications (2002)Google Scholar
  18. 18.
    Shamir, A.: How to Share A Secret. Communications of the ACM (November 1979)Google Scholar
  19. 19.
    Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks. In: Proceedings of IEEE ICNP (2001)Google Scholar
  20. 20.
    Feeney, L., Nilsson, M.: Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment. In: Proceedings of IEEE INFOCOM Anchorage, AK (2001)Google Scholar
  21. 21.
    Hurson, A.R., Bright, M.W.: Multidatabase Systems: An advanced Concept in Handling Distributed Data. Advances in Computers 32 (1991)Google Scholar
  22. 22.
    Lim, J.B., Hurson, A.R.: Transaction processing in a mobile, multi-database environment. Multimedia Tools and Applications 15(2), 161–185 (2001)MATHCrossRefGoogle Scholar
  23. 23.
    Haridas, H.A.R., Hurson, Jiao, Y.: Security Aspects of Wireless Heterogeneous Databases – Protocol, Performance, and Energy Analysis. In: Proceedings of the 2003 International Conference on Parallel Processing Workshops, pp. 417–424 (October 2003)Google Scholar
  24. 24.
    Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks. In: Proceedings of IEEE ICNP (2001)Google Scholar
  25. 25.
  26. 26.
    Das, S.R., Perkins, C.E., Royer, E.M.: Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM), Tel Aviv, Israel, pp. 3–12 (March 2000)Google Scholar
  27. 27.
    Khalili, A., Katz, J., Arbaugh, W.A.: Toward Secure Key Distribution in Truly Ad-Hoc Networks. In: IEEE Workshop on Security and Assurance in Ad-Hoc Networks (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • J. A. Ploskonka
    • 1
  • A. R. Hurson
    • 1
  1. 1.Department of Computer Science and EngineeringThe Pennsylvania State UniversityUniversity Park

Personalised recommendations