Secure Communication in Adverse Mobile Ad Hoc Networks

  • Panagiotis Papadimitratos
  • Zygmunt J. Haas
Part of the Network Theory and Applications book series (NETA, volume 14)

Abstract

The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. Those infrastructure-less, self-organized networks that either operate autonomously or as an extension to the wired networking infrastructure, are expected to support new MANET-based applications. However, the proliferation of this networking paradigm strongly depends on the availability of security provisions, among other factors. The absence of infrastructure, the nature of the envisioned applications, and the resource-constrained environment pose some new challenges in securing the protocols in the ad hoc networking environments. Moreover, the security requirements can differ significantly from those for infrastructure-based networks, while the provision of security enhancements may take completely different directions as well. In particular, practically any node in the open, collaborative MANET environment can abuse the network operation and disrupt or deny communication. In this paper we introduce our approach to this multifaceted and intriguing problem: a set of protocols that secure the fundamental networking operations of routing and data transmission. Moreover, we survey solutions that address the management of trust in ad hoc networks.

Keywords

Agate Bors Volatility Topo Prefix 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    R.K. Ahuja, T.L. Magnati, and J.B. Olin, “Network Flows,” Prentice Hall, Upper Saddle River, NJ, 1993Google Scholar
  2. [2]
    B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens, “An On-Demand Secure Routing Protocol Resilent to Byzantine Failures,” in Proceedings of the ACM Workshop on Wireless Security, Atlanta, GA, Sept. 2002Google Scholar
  3. [3]
    D. Balfanz, D.K. Smetters, P. Stuart, and H.C. Wang, “Talking to Strangers: Authentication in Ad Hoc Networks,” in Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2002Google Scholar
  4. [4]
    S.M. Bellovin and M. Merritt, “Encrypted Key Exchange: Password-based protocols secure against dictionary attacks,” in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1992Google Scholar
  5. [5]
    A. Bestavros and G. Kim, “TCP-Boston: A Fragmentation-Tolerant TCP Protocol for ATM networks,” in Proceedings of the IEEE Infocom 1997, Kobe, Japan, Apr. 1997Google Scholar
  6. [6]
    Bluetooth Special Interest Group, “Specifications of the Bluetooth System,” http://www.bluetooth.corn
  7. [7]
    M. Brown, D. Cheung, D. Hankerson, J.L. Hernadez, M. Kirkup and A. Menezes, “PGP in Constrained Wireless Devices,” in Proceedings of the 9th USENIX Symposium, Denver, CO, Aug. 2000Google Scholar
  8. [8]
    S. Buchegger and J.Y. LeBoudec, “Performance Evaluation of the CONFIDANT protocol,” in Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc), Lausanne, Switzerland, Jun. 2002Google Scholar
  9. [9]
    L. Buttyan and J.P. Hubaux, “Enforcing Service Availability in Mobile Ad Hoc WANs,” in Proceedings of the First ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc), Boston, MA, Aug. 2000Google Scholar
  10. [10]
    B. Dahill, B.N. Levine, E. Royer and C. Shields, “A Secure Routing Protocol for Ad Hoc Networks,” Technical Report UM-CS-2001–037, Dept. of EE and CS, Univ. of Michigan, August 2001Google Scholar
  11. [11]
    W. Diffie and M.E. Hellman, “New directions in cryptography,” IEEE Transactions in Information Theory, Vol IT-22, No 6, p. 644–654, 1976CrossRefMathSciNetGoogle Scholar
  12. [12]
    R. Droms, “Dynamic Host Configuration Protocol,” IETF RFC 2131, Mar. 1997Google Scholar
  13. [13]
    L.M. Feeney, B. Ahlgren and A. Westerlund, “Spontaneous Networking: An Application-Oriented Approach to Ad Hoc Networking,” IEEE Communications Magazine, vol. 39, No. 6, p. 176–181, Jun. 2001CrossRefGoogle Scholar
  14. [14]
    V. Gupta and S. Gupta, “Securing the Wireless Internet,” IEEE Communications Magazine, p. 68–74, December 2001Google Scholar
  15. [15]
    M. Hattig, Editor, “Zero-conf IP Host Requirements,” draft-ietfzeroconf-regts-09.txt, IETF MANET Working Group, Aug. 31st, 2001Google Scholar
  16. [16]
    Z.J. Haas, M.R. Pearlman, P. Samar, “The Interzone Routing Protocol (IERP) for Ad Hoc Networks,” draft-ietf-manet-zone-ierp-02.txt, IETF MANET Working Group, Jul. 2002Google Scholar
  17. [17]
    Z.J. Haas, M.R. Pearlman, P. Samar, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks,” draft-ietf-manet-zrp-02.txt, IETF MANET Working Group, Jul. 2002Google Scholar
  18. [18]
    Y.C. Hu, A. Perrig and D. Johnson, “Ariadne: A Secure on demand routing protocol,” in Proceedings of the The Eighth Annual International Conference on Mobile Computing and Networking (Mobicom), Atlanta, GA, Sept. 2002Google Scholar
  19. [19]
    J.P. Hubaux, L. Buttyan and S. Capkun, “The quest for security in mobile ad hoc networks,” in Proceeding of the Second ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc), San Diego, CA, Oct. 2001Google Scholar
  20. [20]
    D. Johnson et al, “The Dynamic Source Routing Protocol,” draft-ietfmanet-dsr-07.txt, IETF MANET Working Group, Jul. 2002Google Scholar
  21. [21]
    S. Kent and R. Atkinson, “Security Architecture for the Internet Protocol,” IETF RFC 2401, Nov. 1998Google Scholar
  22. [22]
    S. Kent and R. Atkinson, “IP Authentication Header,” IETF RFC 2402, Nov. 1998Google Scholar
  23. [23]
    S. Kent and R. Atkinson, “IP Encapsulating Security Payload,” IETF RFC 2406, Nov. 1998Google Scholar
  24. [24]
    J. Kong, P. Zerfos, H. Luo, S. Lu and L. Zhang, “Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,” in Proceedings of the IEEE International Conference on Network Protocols (ICNP)2001, Riverside, CA, Nov. 2001Google Scholar
  25. [25]
    L. Lamport, “Password Authentication with Insecure Communication,” Communications of the ACM, 24 (11), pp. 770–772, Nov. 1981CrossRefMathSciNetGoogle Scholar
  26. [26]
    S. Marti, T.J. Giuli, K. Lai and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” in Procedings of the The Sixth Annual International Conference on Mobile Computing and Networking (Mobicom) Boston, MA, Aug. 2000Google Scholar
  27. [27]
    D. Maughan, M. Schertler, M. Schneider and J. Turner, “Internet Security Association and Key Management Protocol,” IETF RFC 2408, Nov. 1998Google Scholar
  28. [28]
    A. Menezes, P.V. Oorschot and S. Vanstone, “Handbook of Applied Cryptography,” CRC Press, Oct. 1996 (5th reprinting Aug. 2001 )Google Scholar
  29. [29]
    G. Montenegro and C. Canstellucia, “SUCV Identifiers and Addresses,” draft-montenegro-sucv-02.txt, Internet Engineering Task Force ( IETF ), Jul. 2002Google Scholar
  30. [30]
    S. Murphy et al, “Retrofitting Security into Internet Infrastructure Protocols,” in Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX’00), 2000Google Scholar
  31. [31]
    P. Papadimitratos and Z.J. Haas, “Secure Routing for Mobile Ad Hoc Networks,” in Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, Jan. 2002Google Scholar
  32. [32]
    P. Papadimitratos and Z.J. Haas, “Secure Message Transmission in Mobile Ad Hoc Networks,” Submitted for publication Google Scholar
  33. [33]
    P. Papadimitratos and Z.J. Haas, “Securing the Internet Routing Infrastructure” IEEE Communications Magazine, Vol. 40, No. 10, Oct. 2002Google Scholar
  34. [34]
    P. Papadimitratos and Z.J. Haas, “Secure Link State Routing for Mobile Ad Hoc Networks” in Proceedings of the IEEE CS Workshop on Security and Assurance in Ad hoc Networks, (in conjunction with the 2003 International Symposium on Applications and the Internet), Orlando, FL, Jan. 2003Google Scholar
  35. [35]
    C. Partridge et al, “FIRE: flexible Intra-AS routing environment,” ACM SIGCOMM Computer Comm. Review, Vol. 30, Issue 4, Aug. 2000Google Scholar
  36. [36]
    C.E. Perkins, E.M. Royer and S.R. Das, “Ad hoc On-Demand Distance Vector Routing,” draft-ietf-manet-aodv-08.txt, IETF MANET Working Group, Jun. 2001Google Scholar
  37. [37]
    R. Perlman, “Interconnections: Bridges, Router, Switches and Inter-networking Protocols,” Addisson-Wesley, 2000 Google Scholar
  38. [38]
    M.R. Pearlman and Z.J. Haas, “Determining the Optimal Configuration of for the Zone Routing Protocol,” IEEE JSAC, special issue on Ad-Hoc Networks, vol. 17, no. 8, Aug. 1999Google Scholar
  39. [39]
    M.O. Rabin, “Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance.” Journal of ACM, Vol. 36, No. 2, pp. 335–348, Apr. 1989CrossRefMathSciNetMATHGoogle Scholar
  40. [40]
    R. Rivest, A. Shamir and L. Adleman, “A method for obtaining Digital Signatures and Public Key Cryptosystems,” Communications of the ACMVol. 21, No 2, pp. 120–126, Feb. 1978CrossRefMathSciNetMATHGoogle Scholar
  41. [41]
    R. Rivest, “The MD5 Message-Digest Algorithm,” IETF RFC 1321, Apr. 1992Google Scholar
  42. [42]
    “Secure Hash Standard,” Federal Information Processing Standard, FIPS 180–2, Aug. 2002Google Scholar
  43. [43]
    F. Stajano and R. Anderson, “The Resurrecting Duckling: Security Issues for Ad Hoc Wireless Networks,” in Proceedings of the 7th International Workshop on Security Protocols, LNCS, Springer-Verlag, 1999Google Scholar
  44. [44]
    F. Stajano, “The Resurrecting Duckling - What next?” in Proceedings of the 8th International Workshop on Security Protocols, LNCS, Springer-Verlag, 2000Google Scholar
  45. [45]
    R. Stewart et al, “Stream Control Transmission Protocol,” IETF RFC 2960, Oct. 2000Google Scholar
  46. [46]
    J.W. Suurballe, “Disjoint Paths in a Network,” Networks, vol. 4, p. 125–145, 1974CrossRefMathSciNetGoogle Scholar
  47. [47]
    S. Thomson and T. Narten, “IPv6 Stateless Address Autoconfiguration,” IETF RFC 2462, Dec. 1998Google Scholar
  48. [48]
    C.K. Toh, “Associativity-Based Routing for Ad-Hoc Mobile Networks,” Wireless Personal Communications, Vol. 4, No. 2, pp. 1–36, Mar. 1997CrossRefGoogle Scholar
  49. [49]
    A. Tsirigos and Z.J. Haas, “Multipath Routing in the Presence of Frequent Topological Changes,” IEEE Communications Magazine, p. 132–138, Nov. 2001Google Scholar
  50. [50]
    G.R. Wright and W. Stevens, “TCP/IP Illustrated, vol.2, the implementation.” Addison- Wesley, Feb. 1997Google Scholar
  51. [51]
    S. Yi, P. Naldurg and R. Kravets, “Security-Aware Ad-Hoc Routing for Wireless Networks,” Technical Report UIUCDCS-R-2001–2241, Aug. 2001Google Scholar
  52. [52]
    M.G. Zapata and N. Asokan, “Securing Ad hoc Routing Protocols,” in Proceedings of the ACM Workshop on Wireless Security, Atlanta, GA, Sept. 2002Google Scholar
  53. [53]
    L. Zhou and Z.J. Haas, “Securing Ad Hoc Networks,” IEEE Network Magazine, vol. 13, no.6, Nov./Dec. 1999Google Scholar

Copyright information

© Kluwer Academic Publishers 2004

Authors and Affiliations

  • Panagiotis Papadimitratos
    • 1
  • Zygmunt J. Haas
    • 1
  1. 1.School of Electrical and Computer EngineeringCornell UniversityIthacaUSA

Personalised recommendations