SECURE ROUTING FOR MOBILE AD HOC NETWORKS

被引:50
|
作者
Argyroudis, Patroklos G. [1 ]
O'Mahony, Donal [1 ]
机构
[1] Univ Dublin, Trinity Coll, Dept Comp Sci, Dublin 9, Ireland
来源
基金
爱尔兰科学基金会;
关键词
D O I
10.1109/COMST.2005.1610547
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article we present a survey of secure ad hoc routing protocols for mobile wireless networks. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such self-organized networks do not address possible threats aiming at the disruption of the protocol itself. The assumption of a trusted environment is not one that can be realistically expected; hence, several efforts have been made toward the design of a secure and robust routing protocol for ad hoc networks. We briefly present the most popular protocols that follow the table-driven and the source-initiated on-demand approaches. Based on this discussion we then formulate the threat model for ad hoc routing and present several specific attacks that can target the operation of a protocol. In order to analyze the proposed secure ad hoc routing protocols in a structured way we have classified them into five categories: solutions based on asymmetric cryptography; solutions based on symmetric cryptography; hybrid solutions; reputation-based solutions; and a category of add-on mechanisms that satisfy specific security requirements. A comparison between these solutions can provide the basis for future research in this rapidly evolving area.
引用
收藏
页码:2 / 21
页数:20
相关论文
共 50 条
  • [1] Secure routing for mobile Ad hoc networks
    Liu, Jing
    Fu, Fei
    Xiao, Junmo
    Lu, Yang
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 314 - +
  • [2] Secure Routing Protocols for Mobile Ad Hoc Networks
    Moudni, Houda
    Er-rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [3] A secure routing protocol for mobile ad hoc networks
    Du, D. (orchid_ee@sina.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [4] Secure multipath routing for mobile ad hoc networks
    Kotzanikolaou, P
    Mavropodi, R
    Douligeris, C
    SECOND ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES, PROCEEDINGS, 2005, : 89 - 96
  • [5] Advanced Secure Routing in Ad hoc mobile networks
    Padmadas, M.
    Krishnan, N.
    Sasidharan, Sithara
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 821 - 824
  • [6] A secure routing protocol for mobile Ad hoc networks
    Li, Zhitang
    Shi, Shudong
    6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 153 - +
  • [7] Survey on Secure Routing in Mobile Ad-hoc Networks
    Kannammal, A.
    Roy, S. Sujith
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN HUMAN MACHINE INTERACTION (HMI), 2016, : 154 - 160
  • [8] A secure and pragmatic routing protocol for mobile ad hoc networks
    College of Computer, Huangshi Institute of Technology, Huangshi, Hubei 435003, China
    不详
    J. Donghua Univ., 2008, 1 (11-15):
  • [9] Anonymous secure routing in mobile ad-hoc networks
    Zhu, B
    Wan, ZG
    Kankanhalli, MS
    Bao, F
    Deng, RH
    LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 102 - 108
  • [10] On Secure Mobile Ad hoc Routing
    Li, Xu
    Nayak, Amiya
    Ryl, Isabelle
    Simplot, David
    AD HOC & SENSOR WIRELESS NETWORKS, 2007, 4 (03) : 229 - 254