Academia.eduAcademia.edu

Outline

A secure multipath routing protocol in mobile ad hoc networks

2010, Concurrency and Computation: Practice and Experience

https://doi.org/10.1002/CPE.1506

Abstract

Ad hoc Networks (MANETs). However, existing multipath routing protocols are often practically infeasible due to its security venerability if they suffer from attacks in MANETs, such as repudiation attacks, Denial of Service attacks. In this paper we propose a novel secure multipath routing protocol, referred to as SMRP, and investigate its feasibility and performance. SMRP applies a new heuristic algorithm increasing the number of disjoint paths and a smart authentication mechanism to enhance the security against the attacks in MANETs. The performance results from extensive analysis and experiments show that SMRP can efficiently enhance the security in MANETs while preserving the low overhead of computing and communication.

References (33)

  1. Perkins C, Bhagwat P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Computer Communication Review 1994; 24(4):234-244.
  2. Perkins C, Royer E. Ad-hoc on-demand distance vector routing. Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, vol. 2, 1999; 90-100.
  3. Johnson D, Maltz D, Broch J et al. DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad hoc Networking 2001; 5:139-172.
  4. Aad I, Hubaux JP, Knightly E. Denial of service resilience in ad hoc networks. Proceedings of ACM MobiCom, Philadelphia, PA, September 2004.
  5. Bobba RB, Eschenauer L, Gligor V, Arbaugh W. Bootstrapping security associations for routing in mobile ad-hoc networks, May 2002.
  6. Hu Y, Perrig A, Johnson D. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 2005; 11(1):21-38.
  7. Papadimitratos P, Haas Z. Secure routing for mobile ad hoc networks. SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, TX, 2002; 1-27.
  8. Hu Y, Johnson D, Perrig A. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 2003; I:175-192.
  9. Marti S, Giuli T, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. ACM: New York, NY, U.S.A., 2000; 255-265.
  10. Michiardi P, Molva R. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. CMS'2002, Communication and Multimedia Security 2002 Conference, Portoroz, Slovenia, 22 September 2002.
  11. Lee S, Gerla M. Split multipath routing with maximally disjoint paths in ad hoc networks. IEEE International Conference on Communications, vol. 10, 2001.
  12. Wei W, Zakhor A. Robust multipath source routing protocol (RMPSR) video communication over wireless ad hoc networks. Proceedings of IEEE International Conference on Multimedia and Expo (ICME), Taipeh, 22, 2004.
  13. Rojviboonchai K, Yang F, Zhang Q, Aida H, Zhu W. AMTP: A multipath multimedia streaming protocol for mobile ad hoc networks. Proceedings of IEEE International Conference on Communications (ICC) 2005; 2:1246-1250.
  14. Thulasiraman P, Ramasubramanian S, Krunz M. Disjoint multipath routing to two distinct drains in a multi-drain sensor network. Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Anchorage, Alaska, May 2007; 643-651.
  15. Saha A, Ur Rehman S, Park G-L, Lee J. Directional node-disjoint multipath routing in wireless ad hoc networks. Proceedings of the 19th IASTED International Conference on Parallel and Distributed Computing and Networks, Cambridge, MA, November 2007.
  16. Wu Z, Sun Y, Wu J, Ye S. Robust multi-path zone routing protocol for video transport over reconfigurable wireless networks. Signal Processing Systems 2008; 51(2):183-194.
  17. Jayavelu G, Ramasubramanian S, Younis O. Maintaining colored trees for disjoint multipath routing under node failures. IEEE/ACM Transactions on Networking 2009; 17(1):346-359.
  18. 502 H. YIN ET AL.
  19. Lin S, Wang Y, Mao S, Panwar S. Video transport over ad-hoc networks using multiple paths. IEEE International Symposium on Circuits and Systems, Citeseer, 2002.
  20. Burmester M, Van Le TV. Secure multipath communication in mobile ad hoc networks. International Conference on Information Technology: Coding and Computing, vol. 2, 2004.
  21. Mavropodi R, Kotzanikolaou P, Douligeris C. Performance analysis of secure multipath routing protocols for mobile ad hoc networks. Third International Conference on Wired/Wireless Internet Communications. Springer: Berlin, 2005; 269.
  22. Kotzanikolaou P, Mavropodi R, Douligeris C. Secure multipath routing for mobile ad hoc networks. Second Annual Conference on Wireless On-demand Network Systems and Services, 2005; 89-96.
  23. Perrig A, Canetti R, Tygar D, Song D. The tesla broadcast authentication protocol. Cryptobytes 2002; 5-2:2-13.
  24. Argyroudis PG, O'Mahony D. Secure routing for mobile ad hoc networks. Communications Surveys and Tutorials, IEEE 2005; 7(3):2-21.
  25. Lamport L. Password authentication with insecure communication. Communications of the ACM 1981; 24(11):770-772.
  26. Shamir A. How to share a secret. Communications of the ACM 1979; 22(11):612-613.
  27. Desmedt Y. Some recent research aspects of threshold cryptography. Information Security, First International Workshop ISW '97 (Lecture Notes in Computer Science, vol. 1196), Mambo M, Okamoto E, Davida E (eds.). Springer: Berlin, 1997; 158-173.
  28. Shoup V. Practical Threshold Signatures (Lecture Notes in Computer Science, vol. 1807). Springer: Berlin, 2000; 207-214.
  29. Herzberg A, Jarecki S, Krawczyk H, Yung M. Proactive Secret Sharing or: How to Cope with Perpetual Leakage (Lecture Notes in Computer Science, vol. 963). Springer: Berlin, 1995; 339-352.
  30. Zapata MG. Secure ad hoc on-demand distance vector routing. SIGMOBILE Mobile Computing and Communications Review 2002; 6(3):106-107.
  31. Saxena N, Tsudik G, Yi JH. Admission control in peer-to-peer: Design and performance evaluation. SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. ACM Press: New York, NY, U.S.A., 2003; 104-113.
  32. Roe M. Performance of symmetric ciphers and one-way hash functions. Fast Software Encryption, Cambridge Security Workshop. Springer: London, U.K., 1994; 83-89.
  33. Perkins C, Royer E, Das S, Marina M. Performance comparison of two on-demand routing protocols for adhoc networks. IEEE [see also IEEE Wireless Communications] Personal Communications 2001; 8(1):16-28.