SECURE ROUTING FOR MOBILE AD HOC NETWORKS

被引:50
|
作者
Argyroudis, Patroklos G. [1 ]
O'Mahony, Donal [1 ]
机构
[1] Univ Dublin, Trinity Coll, Dept Comp Sci, Dublin 9, Ireland
来源
基金
爱尔兰科学基金会;
关键词
D O I
10.1109/COMST.2005.1610547
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article we present a survey of secure ad hoc routing protocols for mobile wireless networks. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such self-organized networks do not address possible threats aiming at the disruption of the protocol itself. The assumption of a trusted environment is not one that can be realistically expected; hence, several efforts have been made toward the design of a secure and robust routing protocol for ad hoc networks. We briefly present the most popular protocols that follow the table-driven and the source-initiated on-demand approaches. Based on this discussion we then formulate the threat model for ad hoc routing and present several specific attacks that can target the operation of a protocol. In order to analyze the proposed secure ad hoc routing protocols in a structured way we have classified them into five categories: solutions based on asymmetric cryptography; solutions based on symmetric cryptography; hybrid solutions; reputation-based solutions; and a category of add-on mechanisms that satisfy specific security requirements. A comparison between these solutions can provide the basis for future research in this rapidly evolving area.
引用
收藏
页码:2 / 21
页数:20
相关论文
共 50 条
  • [31] An Adaptive Secure and Efficient Routing Protocol for Mobile Ad Hoc Networks
    Bata Krishna Tripathy
    Swagat Kumar Jena
    Padmalochan Bera
    Satyabrata Das
    Wireless Personal Communications, 2020, 114 : 1339 - 1370
  • [32] A more secure and scalable routing protocol for mobile ad hoc networks
    Qabajeh, Liana Khamis
    Kiah, Miss Laiha Mat
    Qabajeh, Mohammad Moustafa
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (03) : 286 - 308
  • [33] RSRP: A robust secure routing protocol for mobile ad hoc networks
    Afzal, Syed Rehan
    Biswas, Subir
    Koh, Jong-bin
    Raza, Taqi
    Lee, Gunhee
    Kim, Dong-kyoo
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2313 - 2318
  • [34] Secure Location Aided Routing (SLAR) for Mobile Ad Hoc Networks
    Muthupriya, V
    Revathi, S.
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 3018 - 3023
  • [35] Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks
    Ali, Masroor
    Ullah, Zahid
    Khan, Meharban
    Hafeez, Abdul
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (04) : 436 - 441
  • [36] An Adaptive Secure and Efficient Routing Protocol for Mobile Ad Hoc Networks
    Tripathy, Bata Krishna
    Jena, Swagat Kumar
    Bera, Padmalochan
    Das, Satyabrata
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (02) : 1339 - 1370
  • [37] Power Aware and Secure Routing in Mobile and Ad-Hoc Networks
    Arya, K. V.
    Tripathi, Kuldeep Narayan
    2013 8TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2013, : 477 - 482
  • [38] Secure multicast routing protocols in mobile ad-hoc networks
    Moamen, Ahmed Abdel
    Hamza, Haitham S.
    Saroit, Iman A.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) : 2808 - 2831
  • [39] Secure distributed routing in ad hoc networks
    Mir, RN
    Wani, AM
    IEEE TENCON 2003: CONFERENCE ON CONVERGENT TECHNOLOGIES FOR THE ASIA-PACIFIC REGION, VOLS 1-4, 2003, : 1091 - 1095
  • [40] A secure routing protocol for ad hoc networks
    Sanzgiri, K
    Dahill, B
    Levine, BN
    Shields, C
    Belding-Royer, EM
    10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, : 78 - 87