Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-gtxcr Total loading time: 0 Render date: 2024-04-23T19:38:26.202Z Has data issue: false hasContentIssue false

7 - Secure routing

Published online by Cambridge University Press:  26 February 2010

Amitabh Mishra
Affiliation:
Virginia Polytechnic Institute and State University
Get access

Summary

In an ad hoc network, each node is expected to forward the packets of its immediate neighbor to a node closer to destination. Without cooperation of the nodes in the neighborhood, a packet cannot make its journey from a source to destination. If the neighboring nodes are selfish or compromised, then the correct forwarding of the packets through them may not be possible. Compromised nodes often subvert the underlying routing protocol in such a way that a packet gets forwarded to an arbitrary destination, where packets may be subjected to content modification, identity tampering, or simply dropped. This chapter examines the problem of securing the routing protocols of ad hoc networks.

Security aware routing

The desirable properties of a secure route, which are timeliness, ordering, authentication, authorization, data integrity, confidentiality, and non-repudiation are summarized in Table 7.1. The table also indicates the well known techniques that are often employed in practice in achieving these properties in a routing protocol. For example, time stamps are used to ensure timeliness and sequence numbers are used in packet headers to ensure ordering of the routing messages.

The route discovery process is an integral part of a routing protocol, which finds paths between a source–destination pair. When a route discovery process is initiated to find a path that satisfies certain specific criteria such as QoS constraints and if such a route is indeed found, then such a routing protocol is known as a QoS-aware routing protocol [1].

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2008

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

S. Chakrabarti and A. Mishra, “Quality of service in mobile ad hoc networks,” in The Handbook of Ad hoc Wireless Networks, (Ilyas, M., Editor), CRC Press, 2003.Google Scholar
S. Yi, P. Naldurg, and R. Kravets, Security-Aware Ad-Hoc Routing for Wireless Networks, UIUCDCS-R-2001-2241 Technical Report, Aug. 2001.
C. Perkins, E. M. Royer, and S. R. Das, Ad Hoc On-Demand Distance Vector (AODV) Routing. IETF draft, www3.tools.ietf.org/html/draft-ietf-manet-aodv-06, 2000.
B. R. Smith, S. Murthy, and J. J. Garcia-Luna-Aceves, Securing Distance-Vector Routing Protocols, www.isoc.org/isoc/conferences/ndss/97/smith_sl.pdf, 1997.
Marti, S., Giuli, T. J., Lai, K., and Baker, M.. “Mitigating routing misbehavior in mobile ad hoc networks,” 6th International Conference on Mobile Computing and Networking(MOBICOM'00), Aug 2000, pp. 255–265.Google Scholar
L. Buttyan and J. P. Hubaux, “Enforcing service availability in mobile ad hoc WANs,” 1st MobiHoc, Boston, Massachusetts, Aug. 2000.
P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc networks,” SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, Jan. 27–31, 2002.
P. Papadimitratos and Z. J. Haas, “Secure Message Transmission in Mobile Ad Hoc Networks,” in Handbook of Wireless Ad Hoc Networks, (Ilyas, M., Editor), CRC Press, 2003.Google Scholar
H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, www.rfc-ref.org/RFC-TEXTS/2104/, Feb. 1997.
P. Papadimitritos and Haas, Z. “Securing mobile ad hoc networks,” in The Handbook of Ad hoc Wireless Networks, (Ilyas, M., Editor), CRC Press, 2003.Google Scholar
Rabin, M. O., “Efficient dispersal of information for security, load balancing, and fault tolerance,” J. ACM vol. 36, no. 2, Dec. 2002, pp. 335–348.CrossRefGoogle Scholar
M. G. Zapata and N. Asokan, “Securing ad hoc routing protocol,” Proc. ACM WiSe, Atlanta, GA, Sep. 2002, pp. 1–10.
Y. Hu, A. Perrig, and D. B. Johnson, “Ariadne: a secure on-demand routing protocol for ad hoc networks,” Proc. 8thACM Mobicom, Atlanta, GA, Sep. 2002, pp. 12–23.
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, “A secure routing protocol for ad hoc networks,” Proc. ICNP, Nov. 2002, pp. 78–87.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Secure routing
  • Amitabh Mishra, Virginia Polytechnic Institute and State University
  • Book: Security and Quality of Service in Ad Hoc Wireless Networks
  • Online publication: 26 February 2010
  • Chapter DOI: https://doi.org/10.1017/CBO9780511619755.008
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Secure routing
  • Amitabh Mishra, Virginia Polytechnic Institute and State University
  • Book: Security and Quality of Service in Ad Hoc Wireless Networks
  • Online publication: 26 February 2010
  • Chapter DOI: https://doi.org/10.1017/CBO9780511619755.008
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Secure routing
  • Amitabh Mishra, Virginia Polytechnic Institute and State University
  • Book: Security and Quality of Service in Ad Hoc Wireless Networks
  • Online publication: 26 February 2010
  • Chapter DOI: https://doi.org/10.1017/CBO9780511619755.008
Available formats
×