Secure routing in MANETs using local times

被引:0
作者
Stephen Dabideen
J. J. Garcia-Luna-Aceves
机构
[1] Raytheon BBN Technologies,Department of Computer Engineering
[2] University of California,undefined
[3] Santa Cruz,undefined
来源
Wireless Networks | 2012年 / 18卷
关键词
Ad-hoc networks; Security; Routing; Time-based ordering;
D O I
暂无
中图分类号
学科分类号
摘要
We present a new approach to secure routing in mobile ad-hoc networks based solely on the relative transmission times of overhead packets. Unlike most previous works aimed at securing route computation, we eliminate a key vulnerability (explicitly stated routing metrics) altogether. We introduce the Secure Time-Ordered routing Protocol (STOP), which uses time-based orderings to ensure the establishment of multiple loop-free paths between a source and a destination. STOP is the first routing protocol to use performance-based path selection without source routing, path vectors, or complete topology information, making it far more efficient that similar approaches. We prove that adversaries cannot take any action to manipulate the time-based ordering so as to unfairly gain control of the forwarding topology and, by design, nodes which drop data packets will be avoided. Furthermore, at convergence, traffic load is evenly distributed over the well-performing paths, so adversaries cannot gain complete control over the data flow through temporary good behavior. Simulation results show that the countermeasures in STOP are effective against a variety of attacks from independent and colluding adversaries, and that this improved security does not come at the expense of routing performance.
引用
收藏
页码:811 / 826
页数:15
相关论文
共 22 条
[1]  
Cordasco J.(2008)Cryptographic vs. trust-based methods for manet routing security Electronic Notes in Theoretical Computer Science 197 131-140
[2]  
Wetzel S.(2010)An end-to-end approach to secure routing in manets Wiley’s Security and Communication Networks Journal; Special Issue on Security in Mobile Wireless Networks 3 130-149
[3]  
Dabideen S(2002)Routing security in ad hoc networks IEEE Communications Magazine. Special Topics on Security in Telecommunications Networks 40 70-75
[4]  
Smith BR(2010)Computationally secure self-healing key distribution with revocation in wireless ad hoc networks Ad Hoc Networks 8 597-613
[5]  
Garcia-Luna-Aceves JJ(2003)Sead: Secure and efficient distance vector routing for mobile wireless ad hoc networks Ad Hoc Networks 1 175-192
[6]  
Deng H(2005)Ariadne: A secure on-demand routing protocol for ad hoc networks Wireless Networks 11 21-38
[7]  
Li W(2006)Wormhole attacks in wireless networks IEEE Journal on Selected Areas in Communications 24 370-380
[8]  
Agrawal DP(2006)Stationary distributions for the random waypoint mobility model IEEE Transactions on Mobile Computing 3 1153-1166
[9]  
Dutta R(undefined)undefined undefined undefined undefined-undefined
[10]  
Mukhopadhyay S(undefined)undefined undefined undefined undefined-undefined