SECURE ROUTING FOR MOBILE AD HOC NETWORKS

被引:50
作者
Argyroudis, Patroklos G. [1 ]
O'Mahony, Donal [1 ]
机构
[1] Univ Dublin, Trinity Coll, Dept Comp Sci, Dublin 9, Ireland
基金
爱尔兰科学基金会;
关键词
D O I
10.1109/COMST.2005.1610547
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article we present a survey of secure ad hoc routing protocols for mobile wireless networks. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such self-organized networks do not address possible threats aiming at the disruption of the protocol itself. The assumption of a trusted environment is not one that can be realistically expected; hence, several efforts have been made toward the design of a secure and robust routing protocol for ad hoc networks. We briefly present the most popular protocols that follow the table-driven and the source-initiated on-demand approaches. Based on this discussion we then formulate the threat model for ad hoc routing and present several specific attacks that can target the operation of a protocol. In order to analyze the proposed secure ad hoc routing protocols in a structured way we have classified them into five categories: solutions based on asymmetric cryptography; solutions based on symmetric cryptography; hybrid solutions; reputation-based solutions; and a category of add-on mechanisms that satisfy specific security requirements. A comparison between these solutions can provide the basis for future research in this rapidly evolving area.
引用
收藏
页码:2 / 21
页数:20
相关论文
共 52 条
[1]  
[Anonymous], 2003, 3561 RFC
[2]  
[Anonymous], DYNAMIC SOU IN PRESS
[3]  
[Anonymous], 2003, Proc. 4th ACM Int'l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc)
[4]  
[Anonymous], P IEEE WORKSH SEC AS
[5]   Key agreement in ad hoc networks [J].
Asokan, N ;
Ginzboorg, P .
COMPUTER COMMUNICATIONS, 2000, 23 (17) :1627-1637
[6]  
Awerbuch B., 2002, WISE 2002, P21
[7]  
Balfanz D., 2002, P 9 NETW DISTR SYST
[8]  
Buchegger S., 2002, MOBIHOC 2002. Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, P226, DOI 10.1145/513800.513828
[9]  
Capkun S., 2003, ACM WORKSHOP SECURIT, P21
[10]  
Capkun S., 2003, IEEE T MOBILE COMP, V1