More on Castor : the Scalable Secure Routing Protocol for Ad-hoc Networks
2
Citation
23
Reference
20
Related Paper
Abstract:
Wireless ad hoc networks are inherently vulnerable,as any node can disrupt the communication of potentially anyother node in the network. Many solutions to this problem havebeen proposed. In this paper, we take a fresh and comprehen-sive approach, simultaneously addressing three aspects: security,scalability and adaptability to changing network conditions. Ourcommunication protocol, Castor, occupies a unique point in thedesign space: it does not use any control messages except simplepacket acknowledgements, and each node makes routing decisionslocally and independently of other nodes without exchangingrouting state with them. This novel design makes Castor resilientto a wide range of attacks and allows it to scale to large networksizes and to remain efficient under high mobility. We compareCastor against four representative protocols from the literature.Our protocol achieves up to two times higher packet deliveryrates, particularly in large and highly volatile networks, incursno or only limited additional overhead and it is able to survivemore severe attacks and recovers from them faster.Cite
In MANET, reliable and secure communication is the most challenging task. Mobile ad hoc network (MANET) is characterised by mobile hosts, dynamic topology, multi-hop wireless connectivity and infrastructure less ad hoc environment. Limited resource availability such as battery power and security are the major issues to be handled with mobile ad hoc networks. An attacker can easily disrupt the functioning of the network by attacking the underlying routing protocol. Hence, security in ad hoc networks is still a debatable area. In this paper, we have proposed energy-based efficient authenticated routing protocol (EBEARP) for mobile ad hoc networks. Our protocol provides efficient security against route discovery attacks using hop-by-hop signatures. It quickly detects the malicious nodes, thus assisting the nodes to drop the invalid packets, earlier. It also uses an efficient node selection mechanism, which maximises network life time and minimises power consumption. With the help of detailed simulation studies, we show that EBEARP provides better packet delivery ratio with minimised energy.
Cite
Citations (1)
A new innovative deployment of wireless technology is mobile ad hoc network (MANET). A MANET is characterized by no fixed infrastructure or varying topologized structure. This feature allows MANET to be deployed within many circumstances where traditional IP networks are constrained or too expensive in terms of time and resources. Adversely, the mobility of node renders MANETs vulnerable to many malicious attacks. Security mechanism in MANETs usually contains secure routing and secures data transmission. There are already some mechanisms to secure end-to-end transmission but there is limited number of strategies of securing the routing message or protocols. In this paper, we deliberate and implement one secure routing protocol FLSL (adaptive fuzzy logic based security level routing protocol) and study its performance under different scenarios. The implementation of FLSL protocol has been carried out by use of NS-2. Various experiments results from simulation verify the protocols; also demonstrate the feasibility of the protocol. A set of experiments under different scenarios have been presented and results of these experiments have been analysed
Zone Routing Protocol
Cite
Citations (13)
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. In the recent past, most of the ad hoc network routing protocols are cooperative in nature and rely on trust-your-neighbor relationship to route packets among participating nodes. This native trust may paralyze the network with an attack of minimum effort. The dynamics of the ad hoc routing protocols have been studied but security issues and concerns have not been paid much attention. This paper proposes a cluster-based routing protocol with the incorporation of some security in simple manner. Hereafter, the proposed protocol is referred to as Secured Cluster-Based Routing Protocol (SCBRP). This protocol can easily identify and prevent malicious attacks during transmission. With a suitable simulation setup, the protocol has been simulated with 150 nodes and the simulation results have been compared with other cluster-based routing protocols, such as PCBRP-opt and Blind Flooding (BF). The obtained results are in good agreement with those of others. It can be stated that the scheme is robust, secure and provides accurate routing information in a timely manner.
Zone Routing Protocol
Cite
Citations (0)
A mobile ad hoc network (MANET) is a wireless network that does not rely on pre-existing fixed communication infrastructures, but constructs instant interconnections among mobile nodes by self-organizing and self-configuring, often through multi-hopping. In ad hoc, mobile wireless networks the routing protocol is a key to efficient operation. The design of an ad hoc routing protocol is extremely challenging because of mobility, limited computational power, unpredictable radio channel behavior and constrained bandwidth. As the network grows large, an additional challenge must be faced: large number of nodes. Large number of nodes leads to large routing tables and high control traffic overhead, which significantly undermines the scalability of routing protocols.
The dissertation research proposes and studies efficient and scalable routing protocols for wireless mobile ad hoc networks in large scale, especially through effective modeling and handling mobility. The dissertation presents Dynamic Landmark Ad Hoc Routing (LANMAR) protocol as a solution to problems incurred by large network size. LANMAR truncates normal routing operations into a small routing scope, and summarizes routes to remote nodes into a few route directions. When running the protocol, not only can the mobility impact be lessened significantly, but also the routing control overhead can be reduced dramatically, leading to high routing efficiency. The scalability of LANMAR is further studied to extend to diversified application and network domains, and more important, to provide an infrastructure-wise solution to a variety of MANET routing protocols through inter-working with them. To increase the robustness and flexibility, we further develop Multiple Landmark Ad Hoc Routing to work in networks with coordinated motion patterns in large-scale or arbitrary-shaped.
The scalability of LANMAR is enabled by characterizing coordinated motion patterns, a not-so-rare phenomenon appearing in large-scale mobile wireless networks. A scheme that recognizes motion affinity among nodes and dynamically organizes them into manageable groups is proposed by the dissertation research. Combined with a group address lookup service, it considerably simplifies mobility management, and for large-scale networks, enables summarized routes over the groups.
Zone Routing Protocol
Cite
Citations (0)
Mobile Ad hoc Network is an emerging research area with practical applications. Due to its fundamental nature, however, a malicious attack may disrupt the route discovery process and significantly affect the Quality of Service delivered by the network In this paper, we introduce a new secure routing protocol, Secure On-demand Source Routing (SOSR), which follows a number of basic techniques of ad hoc on-demand routing protocols. Our protocol is based on promiscuous receive mode, successfully defeats different types of identified attacks and detects misbehaviors of abnormal nodes. The only requirement of the protocol is a shared key between the communication end nodes. In particular, the scheme offers low processing overhead for intermediate nodes of the network.
Zone Routing Protocol
Cite
Citations (5)
The purpose of the article is a comparison between DC/DC topologies with a wide input voltage range.The research also explains how the implementation of GaN E-HEMT transistors influences the overall efficiency of the converter.The article presents a process of selection of the most efficient topology for stabilization of the battery storage voltage (9 V -36 V) at the level of 24 V, which enables the usage of ultracapacitor energy storage in a wide range of applications, e.g., in automated electric vehicles.In order to choose the most suitable topology, simulation and laboratory research were conducted.The two most promising topologies were selected for verification in the experimental model.Each of the converters was constructed in two versions: with Si and with GaN E-HEMT transistors.The paper presents experimental research results that consist of precise power loss measurements and thermal analysis.The performance with an increased switching frequency of converters was also examined.
Cite
Citations (0)
Zone Routing Protocol
Cite
Citations (0)
최근 무선 네트워크 기술이 각광을 받으면서 다양한 애드 혹 환경에서의 라우팅 프로토콜이 제안되고 있다. 하지만 애드 혹 네트워크라는 환경의 특성 상 보안상 취약한 문제점을 가지고 있으며, 기존의 유선 네트워크 환경에서 제안되었던 보안 라우팅 프로토콜을 적용시키기 힘들다는 문제점이 있다. 이에 따라 Secure AODV나 SRPTES 등의 보안성을 고려한 새로운 애드 혹 라우팅 프로토콜이 제안되었지만 다양한 무선 네트워크 환경의 변화에 유동적으로 대응하기 힘들고 보안적인 측면에 집중을 한 나머지 에너지소모 측면에서는 단점을 노출하고 있다. 본 논문에서는 다양한 애드 혹 네트워크 환경에 적용 가능하고, 기존의 보안 라우팅 프로토콜에 비해 에너지 효율적인 보안 라우팅 프로토콜을 제안하고자 한다. 보안 정보의 보호를 위해 Tree 구조를 도입하고 보안 단계를 통한 Multi-path를 구성하여 악의적인 노드의 Dropping Attack에 대비하여, 예기치 못한 Data Packet의 손실에 대해서도 효율적으로 대처하게 하였다. 실험 결과 악의적인 노드가 존재하는 네트워크 환경에서 기존의 애드 혹 네트워크 보안 라우팅 프로토콜보다 패킷 전송 성공률을 21%정도 향상시킬 수 있었으며 또한 각 노드의 에너지를 균등하게 소모함으로써 전체적인 네트워크의 생존시간이 연장되는 것을 확인할 수 있었다. Routing protocol in ad hoc mobile networking has been an active research area in recent years. However, the environments of ad hoc network tend to have vulnerable points from attacks, because ad hoc mobile network is a kind of wireless network without centralized authentication or fixed network infrastructure such as base stations. Also, existing routing protocols that are effective in a wired network become inapplicable in ad hoc mobile networks. To address these issues, several secure routing protocols have been proposed: SAODV and SRPTES. Even though our protocols are intensified security of networks than existing protocols, they can not deal fluidly with frequent changing of wireless environment. Moreover, demerits in energy efficiency are detected because they concentrated only safety routing. In this paper, we propose an energy efficient secure routing protocol for various ad hoc mobile environment. First of all, we provide that the nodes distribute security information to reliable nodes for secure routing. The nodes constitute tree-structured with around nodes for token escrow, this action will protect invasion of malicious node through hiding security information. Next, we propose multi-path routing based security level for protection from dropping attack of malicious node, then networks will prevent data from unexpected packet loss. As a result, this algorithm enhances packet delivery ratio in network environment which has some malicious nodes, and a life time of entire network is extended through consuming energy evenly.
Zone Routing Protocol
Cite
Citations (0)
Mobile ad hoc networks (MANETs) are a new concept of wireless communications for mobile devices, which offer communications over a shared wireless channel without any pre-existing infrastructure.Their wireless nature and self-organizing capabilities are some of MANET's biggest advantages, as well as their biggest security restrictions.Forming end-to-end secure paths in such MANETs is more challenging than in conventional wireless cellular/wired networks due to the lack of central authorities.An attacker can easily disrupt the routing process by injecting false control messages, changing the paths of packets or simply by blocking the packets of other nodes.In this paper, we propose a novel efficient secure routing protocol, named ASRoP, to effectively secure the routing discovery process in ad hoc networks.ASRoP provides powerful security extensions to the reactive AODV protocol, based on Diffie-Hellman (DH) algorithms and our modified secure remote password protocol.The simulation results show the efficiency of the proposed ASRoP protocol, and its cost towards both the users and the network.ASRoP promises to offer a real opportunity to prevent attacks related to lack of authentication without degrading routing performance.
Zone Routing Protocol
Cite
Citations (3)
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. In this paper, we present MSRP (secure routing protocol for mobile); a secure routing protocol for mobile ad hoc networks that mitigates the detrimental effects of malicious behavior, as to provide correct connectivity information. The protocol guarantees that fabricated, compromised, or replayed route replies would either be rejected or never reach back the querying node. Furthermore, the protocol responsiveness is safeguarded under different types of attacks that exploit the routing protocol itself. The sole requirement of the protocol is that any two nodes that wish to communicate securely can simply establish a priori shared secret, to be used by their routing protocol modules. Specifically, no assumption is made regarding the intermediate nodes, which may exhibit arbitrary and malicious behavior. The scheme is robust in the presence of a number of non-colluding nodes, and provides accurate routing information in a timely manner.
Zone Routing Protocol
Cite
Citations (7)