Authenticated routing for ad hoc networks
2005
Initial work in ad hoc routing has considered only the problem of providing efficient mechanisms for finding paths in very dynamic networks, without considering security. Because of this, there are a number of attacks that can be used to manipulate the routing in an ad hoc network. In this paper, we describe these threats, specifically showing their effects on ad hoc on-demand distance vector and dynamic source routing. Our protocol, named authenticated routing for ad hoc networks (ARAN), uses public-key cryptographic mechanisms to defeat all identified attacks. We detail how ARAN can secure routing in environments where nodes are authorized to participate but untrusted to cooperate, as well as environments where participants do not need to be authorized to participate. Through both simulation and experimentation with our publicly available implementation, we characterize and evaluate ARAN and show that it is able to effectively and efficiently discover secure routes within an ad hoc network.
Keywords:
- Optimized Link State Routing Protocol
- Computer network
- Ad hoc wireless distribution service
- Wireless Routing Protocol
- Dynamic Source Routing
- Vehicular ad hoc network
- Distributed computing
- Adaptive quality of service multi-hop routing
- Wireless ad hoc network
- Destination-Sequenced Distance Vector routing
- Computer science
- Computer security
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
44
References
309
Citations
NaN
KQI