Strategies for enhancing routing security in protocols for mobile ad hoc networks

被引:35
作者
Venkatraman, L [1 ]
Agrawal, DP [1 ]
机构
[1] Univ Cincinnati, Ctr Distributed & Mobile Comp, Dept Elect & Comp Engn & Comp Sci, ECECS, Cincinnati, OH 45221 USA
基金
美国国家科学基金会;
关键词
ad hoc network; authentication; delay; internal and external attacks; public and private keys; routing protocol; security; system key; throughput;
D O I
10.1016/S0743-7315(02)00065-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile ad hoc network (MANET) is a new emerging field with its potential applications in extremely unpredictable and dynamic environments. These characteristics require the networks to have much harder security requirements than the contemporary networks. While current routing protocols do seem to adjust well to dynamically changing conditions, they offer either no security mechanisms at all or have only partial solutions for ensuring the correct routing. It is hard to simultaneously achieve both security and robustness in the routing protocols. In this paper, we analyze various possible threats to the routing protocols and introduce strategies to address the same. On one hand, routing protocol can be disrupted due to attacks from intruder nodes that do not belong to the network. On the other hand, routing is severely affected by the presence of compromised nodes that inflict unpredictable and undetectable Byzantine failure. We have addressed the issue of attacks from intruders by means of authentication techniques that rely on mutual trust between nodes. We also study the behavioral patterns of the nodes and isolate compromised nodes using a distributed approach. The effectiveness of our schemes is illustrated by means of extensive simulations using ns-2 Simulator. The routing protocol chosen for the study is AODV. We have observed the performance of the network with and without our secured routing scheme. (C) 2003 Elsevier Science (USA). All rights reserved.
引用
收藏
页码:214 / 227
页数:14
相关论文
共 28 条
[1]  
AGRAWAL DP, 2000, AUTHENTICATION SCHEM
[2]  
[Anonymous], DYNAMIC SOURCE ROUTI
[3]  
ARBAUGH WA, 2001, YOUR 802 11 NETWORK
[4]  
BINKLEY J, AUTHENTICATED AD HOC
[5]  
BORISOV N, 2000, 7 ANN INT C MOB COMP, P180
[6]  
BOUKERCHE A, 2000, 4 IEEE BIOSP3 BIO IN, P636
[7]  
Broch J., 1998, MobiCom'98. Proceedings of Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, P85, DOI 10.1145/288235.288256
[8]  
Corson S., 1999, MOBILE AD HOC NETWOR
[9]  
DAS SR, 2000, INFOCOM, P3
[10]  
FALL K, 1999, NS NOTES DOCUMENTATI