A Survey of Secure Mobile Ad Hoc Routing Protocols

被引:134
作者
Abusalah, Loay [1 ]
Khokhar, Ashfaq [1 ]
Guizani, Mohsen [2 ]
机构
[1] Univ Illinois, Chicago, IL 60637 USA
[2] Western Michigan Univ, Kalamazoo, MI 49008 USA
关键词
Ad hoc networks; routing protocols; security; wireless systems; mobile routing;
D O I
10.1109/SURV.2008.080407
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several routing protocols have been proposed in recent years for possible deployment of Mobile Ad hoc Networks (MANETs) in military, government and commercial applications. In this paper, we review these protocols with a particular focus on security aspects. The protocols differ in terms of routing methodologies and the information used to make routing decisions. Four representative routing protocols are chosen for analysis and evaluation including: Ad Hoc on demand Distance Vector routing (AODV), Dynamic Source Routing (DSR), Optimized Link State Routing (OLSR) and Temporally Ordered Routing Algorithm (TORA). Secure ad hoc networks have to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability. The analyses of the secure versions of the proposed protocols are discussed with respect to the above security requirements.
引用
收藏
页码:78 / 93
页数:16
相关论文
共 61 条
[41]  
LILIEN L, 2003, CRAC GRID WKSP CGW 0
[42]  
Liu W., 2004, P IEEE INFOCOM 2004
[43]  
MALTZ DA, 1999, CMUCS00150
[44]  
Marti S., 2000, MobiCom 2000. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, P255, DOI 10.1145/345910.345955
[45]  
MICHIARDI P, 2002, IFIP COMM MULT SEC C
[46]  
Murthy S., 1996, Journal of Special Topics in Mobile Networks and Applications (MONET), V1, P183, DOI 10.1007/BF01193336
[47]  
PAPADIMITRATOS P, 2003, P IEEE WKSP SEC ASS
[48]  
Park VD, 1997, IEEE INFOCOM SER, P1405, DOI 10.1109/INFCOM.1997.631180
[49]  
Perkins C., 2000, AD HOC NETWORKING
[50]  
Perkins C. E., 1994, P ACM SIGCOMM, V94