SECURE ROUTING FOR MOBILE AD HOC NETWORKS

被引:50
|
作者
Argyroudis, Patroklos G. [1 ]
O'Mahony, Donal [1 ]
机构
[1] Univ Dublin, Trinity Coll, Dept Comp Sci, Dublin 9, Ireland
来源
基金
爱尔兰科学基金会;
关键词
D O I
10.1109/COMST.2005.1610547
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article we present a survey of secure ad hoc routing protocols for mobile wireless networks. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such self-organized networks do not address possible threats aiming at the disruption of the protocol itself. The assumption of a trusted environment is not one that can be realistically expected; hence, several efforts have been made toward the design of a secure and robust routing protocol for ad hoc networks. We briefly present the most popular protocols that follow the table-driven and the source-initiated on-demand approaches. Based on this discussion we then formulate the threat model for ad hoc routing and present several specific attacks that can target the operation of a protocol. In order to analyze the proposed secure ad hoc routing protocols in a structured way we have classified them into five categories: solutions based on asymmetric cryptography; solutions based on symmetric cryptography; hybrid solutions; reputation-based solutions; and a category of add-on mechanisms that satisfy specific security requirements. A comparison between these solutions can provide the basis for future research in this rapidly evolving area.
引用
收藏
页码:2 / 21
页数:20
相关论文
共 50 条
  • [21] A secure global state routing for mobile ad hoc networks
    Jing, Chen
    Hua, Cui Guo
    Liang, Hong
    PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2006, 4217 : 228 - 238
  • [22] An Intelligent Scheme of Secure Routing for Mobile Ad Hoc Networks
    Zhang, Zhongwei
    ICSPCS: 2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, PROCEEDINGS, 2008, : 551 - 556
  • [23] A Key Management Solution for Secure Routing in Mobile Ad Hoc Networks
    Ashraph, Sulaiman
    Dawoud, Dawoud S.
    Niyonkuru, Adronis
    IMETI 2011: 4TH INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II, 2011, : 68 - 72
  • [24] Secure Anonymity Multipath Routing Protocol in Mobile Ad Hoc Networks
    Wu, Meng
    Chen, Siguang
    PROCEEDING OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNOLOGIES, 2009, : 81 - 85
  • [25] Secure enhancement scheme for routing protocol in mobile ad hoc networks
    Yang, RJ
    Pan, QH
    Wang, WN
    Li, ML
    25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2005, : 664 - 667
  • [26] Robust Secure Routing Protocol for Mobile Ad Hoc Networks (MANETs)
    Dilli, Ravilla
    Reddy, P. Chandra Sekhar
    INNOVATIONS IN ELECTRONICS AND COMMUNICATION ENGINEERING, 2019, 33 : 393 - 399
  • [27] Secure and scalable routing protocol for Mobile Ad-hoc Networks
    Kang, NH
    Park, I
    Kim, Y
    MOBILITY AWARE TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2005, 3744 : 334 - 343
  • [28] Distributed Secure Routing Protocol for Mobile Ad-Hoc Networks
    Khalil, Issa
    Bataineh, Sameer
    Qubajah, Liana
    Khreishah, Abdallah
    2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 106 - 110
  • [29] Secure routing protocols for mobile ad-hoc wireless networks
    Pirzada, AA
    McDonald, C
    ADVANCED WIRED AND WIRELESS NETWORKS, 2005, 26 : 57 - 80
  • [30] Secure content based routing in tactical mobile ad hoc networks
    Lin, Yow-Jian
    Natarajan, Narayanan
    MILCOM 2006, VOLS 1-7, 2006, : 1230 - +