Robust Routing in Malicious Environment for Ad Hoc Networks

  • Zhongchao Yu
  • Chuk-Yang Seng
  • Tao Jiang
  • Xue Wu
  • William A. Arbaugh
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3439)


Secure routing in ad hoc networks has been extensively studied in recent years. The vast majority of this work, however, has only focused on providing authenticity of the route. Availability of the network in a malicious environment has largely been ignored.

In this paper, we divide the secure routing problem into two layers. The first layer provides authenticated routing and the second layer provides a route selection algorithm that selects a route with the highest probability of successful delivery rather than the shortest route. We provide a metric for evaluating this probability. We provide simulation results that demonstrate that our approach increases the throughput by at least ten percent in a network where fifty percent of the nodes are malicious when compared to an approach that selects the shortest route. Furthermore, our approach incurs only a small delay when compared to the delay along the shortest route.


Malicious Node Route Discovery Route Request Upstream Node Downstream Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. MobiCom (2002)Google Scholar
  2. 2.
    Hu, Y.-C., Johnson, D.B., Perrig, A.: Secure efficient distance vector routing in mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA) (June 2002)Google Scholar
  3. 3.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: WiSe (2003)Google Scholar
  4. 4.
    Zapata, M.G., Asokan, N.: Securing ad hoc routing protocols. In: WiSe (2002)Google Scholar
  5. 5.
    Sanzgiri, K., Dahill, B.: A secure routing protocol for ad hoc networks. In: ICNP 2002 (2002)Google Scholar
  6. 6.
    Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness In Dynamic Ad-hoc Networks). In: MobiHoc 2002 (2002)Google Scholar
  7. 7.
    Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom 2000 (2000)Google Scholar
  8. 8.
    Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  9. 9.
    Buttyan, L., Hubaux, J.-P.: Enforcing service availability in mobile ad hoc WANs. In: Proceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston (August 2000)Google Scholar
  10. 10.
    Buttyan, L., Hubaux, J.-P.: Stimulating cooperation in self-organization mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications 8(5) (October 2003)Google Scholar
  11. 11.
    Jackobsson, M., Hubaux, J.-P., Buttyan, L.: A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In: Proceedings of Financial Cryptography (2003)Google Scholar
  12. 12.
    Zhong, S., Yang, Y.R., Chen, J.: Sprite: a simple, cheat-proof, credit-based system for mobile ad hoc networks. In: Proceedings of INFOOM. IEEE, Los Alamitos (2003)Google Scholar
  13. 13.
    Capkun, S., Hubaux, J.-P.: BISS: building secure routing out of an incomplete set of security associations. In: WiSe 2003 (2003)Google Scholar
  14. 14.
    Johnson, D., Maltz, D., Broch, J.: DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. In: Perkins, C.E. (ed.) Ad Hoc Networking, Ch. 5, pp. 139–172. Addison-Wesley, Reading (2001)Google Scholar
  15. 15.
    Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.-C., Jetcheva, J.: A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM 1998), Dallas, TX, USA, October 1998, pp. 85–97 (1998)Google Scholar
  16. 16.
    The Network Simulator ns-2,

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Zhongchao Yu
    • 1
  • Chuk-Yang Seng
    • 1
  • Tao Jiang
    • 2
  • Xue Wu
    • 1
  • William A. Arbaugh
    • 1
    • 3
  1. 1.Dept. of Computer ScienceUniversity of MarylandCollege ParkUSA
  2. 2.Dept. of Electronic and EngineeringUniversity of MarylandCollege ParkUSA
  3. 3.University of Maryland Institute of Advanced Computer StudiesCollege ParkUSA

Personalised recommendations