SECURE ROUTING FOR MOBILE AD HOC NETWORKS

被引:50
|
作者
Argyroudis, Patroklos G. [1 ]
O'Mahony, Donal [1 ]
机构
[1] Univ Dublin, Trinity Coll, Dept Comp Sci, Dublin 9, Ireland
来源
基金
爱尔兰科学基金会;
关键词
D O I
10.1109/COMST.2005.1610547
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article we present a survey of secure ad hoc routing protocols for mobile wireless networks. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols designed to accommodate the needs of such self-organized networks do not address possible threats aiming at the disruption of the protocol itself. The assumption of a trusted environment is not one that can be realistically expected; hence, several efforts have been made toward the design of a secure and robust routing protocol for ad hoc networks. We briefly present the most popular protocols that follow the table-driven and the source-initiated on-demand approaches. Based on this discussion we then formulate the threat model for ad hoc routing and present several specific attacks that can target the operation of a protocol. In order to analyze the proposed secure ad hoc routing protocols in a structured way we have classified them into five categories: solutions based on asymmetric cryptography; solutions based on symmetric cryptography; hybrid solutions; reputation-based solutions; and a category of add-on mechanisms that satisfy specific security requirements. A comparison between these solutions can provide the basis for future research in this rapidly evolving area.
引用
收藏
页码:2 / 21
页数:20
相关论文
共 50 条
  • [41] Truthful and Secure Routing in Ad Hoc Networks
    Kargar, Mehdi
    Ghodsi, Mohammad
    CSA 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND ITS APPLICATIONS, PROCEEDINGS, 2008, : 369 - 376
  • [42] Trusted Secure Routing for Ad Hoc Networks
    Haghpanah, Nima
    Akhoondi, Masould
    Kargar, Mehdi
    Movaghar, Ali
    MOBIWAC'07: PROCEEDINGS OF THE FIFTH ACM INTERNATIONAL WORKSHOP ON MOBILITY MANAGEMENT AND WIRELESS ACCESS, 2007, : 176 - 179
  • [43] I-SEAD: A secure routing protocol for mobile ad hoc networks
    Lin, Chu-Hsing
    Lai, Wei-Shen
    Huang, Yen-Lin
    Chou, Mei-Chun
    MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2008, : 102 - +
  • [44] A new reactive secure routing protocol for mobile ad-hoc networks
    Saha, Soma
    Chaki, Rituparna
    Chaki, Nabendu
    SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS, 2008, : 103 - +
  • [45] SECURE 2ACK ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS
    Vijaya, K.
    2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 752 - 758
  • [46] Secure position-based routing protocol for mobile ad hoc networks
    Song, Joo-Han
    Wong, Vincent W. S.
    Leung, Victor C. M.
    AD HOC NETWORKS, 2007, 5 (01) : 76 - 86
  • [47] Location-aided secure routing scheme in mobile ad hoc networks
    Lee, Do-hyeon
    Choi, Sun
    Choi, Ji-hyeon
    Jung, Jae-il
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 131 - 139
  • [48] ECC-based secure routing algorithm for mobile Ad hoc networks
    Chen, Shu-Yi
    Wang, Cui-Rong
    Zhao, Hong
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2006, 27 (06): : 646 - 649
  • [49] SDRP: secure and dynamic routing protocol for mobile ad-hoc networks
    Ghosh, Uttam
    Datta, Raja
    IET NETWORKS, 2014, 3 (03) : 235 - 243
  • [50] Performance analysis of secure multipath routing protocols for mobile ad hoc networks
    Mavropodi, R
    Kotzanikolaou, P
    Douligeris, C
    WIRED/WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2005, 3510 : 269 - 278