The Goal of Securing Mobile Ad-Hoc Network and Solutions

  • Najiya Sultana
  • S. S. Sarangdevat
Part of the Communications in Computer and Information Science book series (CCIS, volume 205)


In this article we assess security threats and summarize representative proposals in the context of ad-hoc networks. In this paper, we survey the stateof- the-art approach to providing security for wireless networking paradigms, namely mobile ad-hoc networks. We identify the security threats as well as examine the current solutions. We further summarize lessons learned, discuss open issues, and identify future directions.


Intermediate Node Malicious Node Distance Vector Security Threat Trust Third Party 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kurose, J., Ross, K.: Computer Networking: A Top-Down Approach Featuring the Internet. Addison-Wesley, Reading (2002)Google Scholar
  2. 2.
    Perkins, C., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In: Proc. SIGCOMM (1994)Google Scholar
  3. 3.
    Perkins, C., Royer, E.: Ad Hoc On-demand Distance Vector Routing. In: Proc. WMCSA (1999)Google Scholar
  4. 4.
    Johnson, D., Maltz, D., Jetcheva, J.: Ad Hoc Networking. In: DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Network, ch. 5. Addison-Wesley, Reading (2001)Google Scholar
  5. 5.
    Perrig, A., Canetti, R., Tygar, D., Song, D.: The TESLA Broadcast Authentication Protocol. RSA CryptoBytes 5(2), 2–13 (2002)Google Scholar
  6. 6.
    Hu, Y., Johnson, D., Perrig, A.: Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proc. IEEE Workshop on Mobile Computing Systems and Applications, WMCSA (2002)Google Scholar
  7. 7.
    Zapata, M., Asokan, N.: Securing Ad Hoc Routing Protocols. In: Proc. WiSe (2002)Google Scholar
  8. 8.
    Hu, Y., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In: Proc. INFOCOM (2003)Google Scholar
  9. 9.
    Malkin, G.: Routing Information Procotol Version 2. RFC 2543 (1998)Google Scholar
  10. 10.
    Pei, D., Massey, D., Zhang, L.: Detection of Invalid Routing Announcements in RIP Protocol. In: IEEE Globecom (2003)Google Scholar
  11. 11.
    Papadimitratos, P., Haas, Z.J.: Secure Link State Routing for Mobile Ad Hoc Networks. In: IEEE Workshop on Security and Assurance in Ad Hoc Networks (2003)Google Scholar
  12. 12.
    Hu, Y., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks. In: Proc. MOBICOM 2002 (2002)Google Scholar
  13. 13.
    Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proc. Mobicom (2000)Google Scholar
  14. 14.
    Yang, H., Meng, X., Lu, S.: Self-Organized Network Layer Security in Mobile Ad Hoc Networks. In: Proc. WiSe (2002)Google Scholar
  15. 15.
    Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Secure Routing Protocol Resilent to Byzantine Failures. In: Proc. WiSe (2002)Google Scholar
  16. 16.
    Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: URSA: Ubiquitous and Robust Access Control for Mobile Ad-Hoc Networks. IEEE/ACM Transactions on Networking (2004) (to appear)Google Scholar
  17. 17.
    Zhou, L., Haas, Z.: Securing Ad Hoc Networks. IEEE Network 13(6), 24–30 (1999)CrossRefGoogle Scholar
  18. 18.
    Aresenault, A., Turner, S.: Internet X.509 Public Key Infrastructure. Internet Draft, draft-ietf-pkix-roadmap-06.txt (2000) (work in progress)Google Scholar
  19. 19.
    Desmedt, Y.: Threshold cryptography. European Transactions on Telecommunications 5(4), 449–457 (1994)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Ostrovsky, R., Yung, M.: How to Withstand Mobile Virus Attacks. In: Proc. ACM Symposium on Principles of Distributed Computing (1991)Google Scholar
  21. 21.
    Zimmermann, P.: The Official PGP User’s Guide. MIT Press, Cambridge (1995)Google Scholar
  22. 22.
    Hubaux, J., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: Proc. MobiHOC (2001)Google Scholar
  23. 23.
    Capkun, S., Buttyan, L., Hubaux, J.: Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing 2(1) (January-March 2003)Google Scholar
  24. 24.
    Capkun, S., Hubaux, J., Buttyan, L.: Mobility Helps Security In Ad Hoc Networks. In: Proc. MobiHoc (2003)Google Scholar
  25. 25.
    Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. In: Proc. NDSS (2002)Google Scholar
  26. 26.
    Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In: Proc. ICNP (2001)Google Scholar
  27. 27.
    Gupta, P., Kumar, P.: The Capacity of Wireless Networks. IEEE Transactions on Information Theory, IT-46(2), 388–404 (2000)MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Najiya Sultana
    • 1
  • S. S. Sarangdevat
    • 1
  1. 1.Computer Science & IT DepartmentRajasthan Vidhyapith UniversityUdaipurIndia

Personalised recommendations