Inherent security of routing protocols in ad-hoc and sensor networks

被引:0
|
作者
Roosta, Tanya [1 ]
Pai, Sameer [2 ]
Chen, Phoebus [1 ]
Sastry, Shankar [1 ]
Wicker, Stephen [2 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Berkeley, CA 94720 USA
[2] Cornell Univ, Sch Elect & Comp Engn, Ithaca, NY USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Many of the routing protocols that have been designed for wireless ad-hoc networks focus on energy-efficiency and guaranteeing high throughput in a non-adversarial setting. However, given that ad-hoc and sensor networks are deployed and left unattended for long periods of time, it is crucial to design secure routing protocols for these networks. Over the past few years, attacks on the routing protocols have been studied and a number of secure routing protocols have been designed for wireless sensor networks. However, there has not been a comprehensive study of how these protocols compare in terms of achieving security goals and maintaining high throughput. In this paper, we focus on the problem of analyzing the inherent security of routing protocols with respect to two categories: multi-path and single-path routing. Within each category, we focus on deterministic vs. probabilistic mechanisms Or setting up the routes. We consider the scenario in which an adversary has subverted a subset of the nodes, and as a result, the paths going through these nodes are compromised. We present our findings through simulation results.
引用
收藏
页码:1273 / +
页数:2
相关论文
共 50 条
  • [41] Performance Evolution of Optimal Routing Protocols for Ad-Hoc Wireless Networks
    Manasa, B.
    Rajesh, M.
    Rao, D. Sreenivasa
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 1221 - 1226
  • [42] Routing in Aeronautical Ad-hoc Networks
    Vey, Quentin
    Puechmorel, Stephane
    Pirovano, Alain
    Radzik, Jose
    2016 IEEE/AIAA 35TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2016,
  • [43] Mobility and security issues in wireless ad-hoc sensor networks
    Boudriga, N
    Obaidat, MS
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 2777 - 2781
  • [44] Routing with anycasting in ad-hoc networks
    Ahmad, R
    Azam, F
    Li, Z
    2005 INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2005, : 400 - 405
  • [45] Stochastic routing in ad-hoc networks
    Lott, C
    Teneketzis, D
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2006, 51 (01) : 52 - 70
  • [46] Comparing the routing energy overheads of ad-hoc routing protocols
    Bansal, S
    Shorey, R
    Misra, A
    WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1155 - 1161
  • [47] AODVsec: A Multipath Routing Protocol in Ad-Hoc Networks for Improving Security
    Wang, Cuirong
    Cai, Shuxin
    Li, Rui
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 401 - +
  • [48] The Study on Ad hoc Networks Security Strategy based on Routing Protocols
    Ma Hongwei
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 445 - 449
  • [49] Strategies for enhancing routing security in protocols for mobile ad hoc networks
    Venkatraman, L
    Agrawal, DP
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2003, 63 (02) : 214 - 227
  • [50] A Propose to Enhance the AODV Routing Protocols' Security of Ad hoc Networks
    Li, Qing
    Wu, Wendan
    Jiang, Hanhong
    2008 IEEE INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING WORKSHOP PROCEEDINGS, VOLS 1 AND 2, 2008, : 30 - +