Abstract
The dynamic topologies and membership in MANET make it difficult to use conventional routing protocol for propagating trusted routing message between individual nodes. However, it is the most important thing to implement the secure communication in MANET that how to propagate routing message dependably to discover the secure shortest paths. This paper defines a trusted routing discovery model, MARD, which proposed to authenticate the protocol participants in order to prevent the malicious node from providing secure shortest paths, negotiate one times session keys to encrypt the communication between the source and destination nodes by using the routing discovery mechanism at the same time. In the end, the analysis shows that secure goals have been achieved.
Foundation item: Supported by the National network & information secure guarantee sustainable development plan (2004 Research 1-917-C-021).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Royer, E.M., Toh, C.K.: A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks. IEEE Personal Communications Magazine 6(2), 46–55 (1999)
Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network Magazine 13(6) (1999)
Bayya, A.K., Gupte, S., Shukla, Y.K., Garikapati, A.: Security in ad hoc network, University of Kentucky, http://cs.engr.uky.edu/~singhal/term-papers/Fourth-paper.doc
Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Proceedings of the eighth Annual International Conference on Mobile Computing and Networking, pp. 12–23 (2002)
Pirzada, A.A., McDonald, C.: Establishing Trust In Pure Ad-hoc Networks. In: Proc. of 27th Australasian Computer Science Conference (ACSC 2004), vol. 26(1), pp. 47–54 (2004)
Pirzada, A.A., McDonald, C.: A Review of Secure Routing Protocols for Ad hoc Mobile Wireless Networks. In: Proc. of 2nd Workshop on the Internet, Telecommunications and Signal Processing (DSPCS 2003 & WITSP 2003), pp. 118–123 (2003)
Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 2002, pp. 27–31 (2002)
Dahill, B., Levine, B.N., Royer, E., Shields, C.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP) (November 2002)
Yi, S., Naldurg, P., Kravets, R.: Security-Aware Ad Hoc Routing Protocol for Wireless Networks. In: The 6th World Multi-Conference on Systemics, Cybernetics and Informatics, SCI 2002 (2002)
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. IETF RFC 3561 (2003)
Murphy, S., Badger, M., Wellington, B.: OSPF with Digital Signatures. RFC 2154 (June 1997)
Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad hoc Networks. In: Proc. of the 6th International Conference on Mobile Computing and Networking (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, Z., Guo, W., Xu, F. (2005). Dependable Propagating Routing Information in MANET. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_81
Download citation
DOI: https://doi.org/10.1007/11534310_81
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28102-3
Online ISBN: 978-3-540-31868-2
eBook Packages: Computer ScienceComputer Science (R0)