Inherent security of routing protocols in ad-hoc and sensor networks

被引:0
|
作者
Roosta, Tanya [1 ]
Pai, Sameer [2 ]
Chen, Phoebus [1 ]
Sastry, Shankar [1 ]
Wicker, Stephen [2 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
[2] Cornell Univ, Sch Elect & Comp Engn, Ithaca, NY USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Many of the routing protocols that have been designed for wireless ad-hoc networks focus on energy-efficiency and guaranteeing high throughput in a non-adversarial setting. However, given that ad-hoc and sensor networks are deployed and left unattended for long periods of time, it is crucial to design secure routing protocols for these networks. Over the past few years, attacks on the routing protocols have been studied and a number of secure routing protocols have been designed for wireless sensor networks. However, there has not been a comprehensive study of how these protocols compare in terms of achieving security goals and maintaining high throughput. In this paper, we focus on the problem of analyzing the inherent security of routing protocols with respect to two categories: multi-path and single-path routing. Within each category, we focus on deterministic vs. probabilistic mechanisms Or setting up the routes. We consider the scenario in which an adversary has subverted a subset of the nodes, and as a result, the paths going through these nodes are compromised. We present our findings through simulation results.
引用
收藏
页码:1273 / +
页数:2
相关论文
共 50 条
  • [1] Directional routing protocols for ad-hoc networks
    Hu, B.
    Gharavi, H.
    IET COMMUNICATIONS, 2008, 2 (05) : 650 - 657
  • [2] Routing protocols in mobile Ad-hoc networks
    Gilaberte, RL
    Herrero, LP
    Proceedings of the Fourth IASTED International Conference on Communication Systems and Networks, 2005, : 196 - 201
  • [3] Routing protocols in Mobile Ad-hoc Networks
    Mikaric, Bratislav
    Rancic, Dejan
    Ilic, Slavisa
    PRZEGLAD ELEKTROTECHNICZNY, 2020, 96 (08): : 106 - 111
  • [4] Methods for Securing Routing Protocols in Ad-Hoc Networks
    Costinela-Luminita, Ciobanu
    Magdalena, Ciobanu Nicoleta
    14TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2012), 2012, : 341 - 348
  • [5] Performance of Standardized Routing Protocols in Ad-hoc Networks
    Alahdal, Tariq A.
    Mohammad, Saida
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONICS ENGINEERING (ICCEEE), 2013, : 23 - 28
  • [6] Anonymous Routing Protocols for Mobile Ad-Hoc Networks
    Lu, Tianbo
    Chen, Hao
    Zhao, Lingling
    Li, Yang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 229 - 239
  • [7] A Survey of Multicast Routing Protocols in Ad-Hoc Networks
    Baker, Mohammed R.
    Akcayol, M. Ali
    GAZI UNIVERSITY JOURNAL OF SCIENCE, 2011, 24 (03): : 451 - 462
  • [8] An Application of Routing Protocols for Vehicular Ad-hoc Networks
    Tomer, Pratibha
    Chandra, Munesh
    2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 157 - 160
  • [9] Energy Based Proficiency Analysis of Ad-hoc Routing Protocols in Wireless Sensor Networks
    Sharma, Rohini
    Lobiyal, D. K.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 882 - 886
  • [10] Overview of Multicast Routing Protocols for Mobile Ad-hoc Networks
    Vijayalakshmi, J.
    Prabu, K.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 256 - 260