A Survey of Secure Mobile Ad Hoc Routing Protocols

被引:134
作者
Abusalah, Loay [1 ]
Khokhar, Ashfaq [1 ]
Guizani, Mohsen [2 ]
机构
[1] Univ Illinois, Chicago, IL 60637 USA
[2] Western Michigan Univ, Kalamazoo, MI 49008 USA
关键词
Ad hoc networks; routing protocols; security; wireless systems; mobile routing;
D O I
10.1109/SURV.2008.080407
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several routing protocols have been proposed in recent years for possible deployment of Mobile Ad hoc Networks (MANETs) in military, government and commercial applications. In this paper, we review these protocols with a particular focus on security aspects. The protocols differ in terms of routing methodologies and the information used to make routing decisions. Four representative routing protocols are chosen for analysis and evaluation including: Ad Hoc on demand Distance Vector routing (AODV), Dynamic Source Routing (DSR), Optimized Link State Routing (OLSR) and Temporally Ordered Routing Algorithm (TORA). Secure ad hoc networks have to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability. The analyses of the secure versions of the proposed protocols are discussed with respect to the above security requirements.
引用
收藏
页码:78 / 93
页数:16
相关论文
共 61 条
[1]  
ABUSALAH L, 2006, P ACM INT WIR COMM M
[2]  
ABUSALAH L, 2007, P 50 ANN IEEE GLOB I
[3]  
[Anonymous], P IEEE TEL C GLOBECO
[4]  
[Anonymous], 2003, 3626 RFC
[5]  
[Anonymous], 2003, P 2 ACM WORKSH WIR S
[6]  
[Anonymous], 1997, 2001 IETF RFC
[7]  
[Anonymous], 2002, P 2002 ACM WORKSH WI
[8]  
BHARGAVA B, 2003, TRUST PRIVACY SECURI
[9]  
BHARGAVA B, 2002, P DAT WAR KNOWL MAN
[10]  
BUCHEGGER S, 2004, CH1015