An end-to-end approach to secure routing in MANETs

被引:2
作者
Dabideen, Stephen [1 ]
Smith, Bradley R. [1 ]
Garcia-Luna-Aceves, J. J. [1 ,2 ]
机构
[1] Univ Calif Santa Cruz, Dept Comp Engn, Santa Cruz, CA 95064 USA
[2] Palo Alto Res Ctr, Palo Alto, CA 94304 USA
关键词
security; ad-hoc networks; end-to-end;
D O I
10.1002/sec.121
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing secure routing in mobile ad hoc networks (MANETs) is far more difficult than establishing secure routing in wired networks or static wireless networks. Node mobility and the relative scarcity of bandwidth render prior solutions ineffective. Solutions based on securing link or path information do not work well in MANETs because the dynamic nature of links requires extensive use of flooding to establish effective countermeasures. On the other hand, solutions based on hop-by-hop exchanges of distance information are easily compromised. Instead of trying to secure the ordering of nodes, we argue that secure routing in MANETs must be based on the end-to-end verification of physical-path characteristics aided by the exploitation of path diversity to increase the probability of finding secure paths. We apply this approach to the design of the Secure Routing through Diversity and Verification (SRDV) protocol, a secure routing protocol that we show to be as efficient as unsecured on-demand or proactive routing approaches in the absence of attacks. We prove that the countermeasures used in SRDV can defend against a variety of known attacks to routing protocols, including attacks involving collusion, and the fabrication and modification of routing packets. We also show the effectiveness of the end-to-end mechanisms via simulations. Copyright (C) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:130 / 149
页数:20
相关论文
共 50 条
  • [41] Secure End-to-End Key Establishment Protocol for Resource-Constrained Healthcare Sensors in the Context of IoT
    Iqbal, Muhammad A.
    Bayoumi, Magdy
    2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, : 523 - 530
  • [42] SPELL: An End-to-End Tool Flow for LLM-Guided Secure SoC Design for Embedded Systems
    Paria, Sudipta
    Dasgupta, Aritra
    Bhunia, Swarup
    IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (04) : 365 - 368
  • [43] An End-to-End Approach for Document-level Event Factuality Identification in Chinese
    Li, Xiaojia
    Zhang, Yun
    Qian, Zhong
    2020 INTERNATIONAL CONFERENCE ON ASIAN LANGUAGE PROCESSING (IALP 2020), 2020, : 215 - 220
  • [44] Ceremonies for End-to-End Verifiable Elections
    Kiayias, Aggelos
    Zacharias, Thomas
    Zhang, Bingsheng
    PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 305 - 334
  • [45] Implementation of End-to-end connection of SAN
    Zhang Xin-Ying
    Tu Xiao-Dong
    2010 INTERNATIONAL CONFERENCE ON THE DEVELOPMENT OF EDUCATIONAL SCIENCE AND COMPUTER TECHNOLOGY, 2010, : 185 - 187
  • [46] End-to-end Accented Speech Recognition
    Viglino, Thibault
    Motlicek, Petr
    Cernak, Milos
    INTERSPEECH 2019, 2019, : 2140 - 2144
  • [47] An End-to-End Attack on Text CAPTCHAs
    Zi, Yang
    Gao, Haichang
    Cheng, Zhouhang
    Liu, Yi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 753 - 766
  • [48] On the scope of end-to-end probing methods
    Pásztor, A
    Veitch, D
    IEEE COMMUNICATIONS LETTERS, 2002, 6 (11) : 509 - 511
  • [49] End-to-End Security for Personal Telehealth
    Koster, Paul
    Asim, Muhammad
    Petkovic, Milan
    USER CENTRED NETWORKED HEALTH CARE, 2011, 169 : 621 - 625
  • [50] Improve End-to-End Security using S-aePAKE
    Parmar, Hiren
    Gosai, Atul
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 333 - 338