Skip to main content

Dependable Propagating Routing Information in MANET

  • Conference paper
Networking and Mobile Computing (ICCNMC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3619))

Included in the following conference series:

  • 573 Accesses

Abstract

The dynamic topologies and membership in MANET make it difficult to use conventional routing protocol for propagating trusted routing message between individual nodes. However, it is the most important thing to implement the secure communication in MANET that how to propagate routing message dependably to discover the secure shortest paths. This paper defines a trusted routing discovery model, MARD, which proposed to authenticate the protocol participants in order to prevent the malicious node from providing secure shortest paths, negotiate one times session keys to encrypt the communication between the source and destination nodes by using the routing discovery mechanism at the same time. In the end, the analysis shows that secure goals have been achieved.

Foundation item: Supported by the National network & information secure guarantee sustainable development plan (2004 Research 1-917-C-021).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Royer, E.M., Toh, C.K.: A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks. IEEE Personal Communications Magazine 6(2), 46–55 (1999)

    Article  Google Scholar 

  2. Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network Magazine 13(6) (1999)

    Google Scholar 

  3. Bayya, A.K., Gupte, S., Shukla, Y.K., Garikapati, A.: Security in ad hoc network, University of Kentucky, http://cs.engr.uky.edu/~singhal/term-papers/Fourth-paper.doc

  4. Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Proceedings of the eighth Annual International Conference on Mobile Computing and Networking, pp. 12–23 (2002)

    Google Scholar 

  5. Pirzada, A.A., McDonald, C.: Establishing Trust In Pure Ad-hoc Networks. In: Proc. of 27th Australasian Computer Science Conference (ACSC 2004), vol. 26(1), pp. 47–54 (2004)

    Google Scholar 

  6. Pirzada, A.A., McDonald, C.: A Review of Secure Routing Protocols for Ad hoc Mobile Wireless Networks. In: Proc. of 2nd Workshop on the Internet, Telecommunications and Signal Processing (DSPCS 2003 & WITSP 2003), pp. 118–123 (2003)

    Google Scholar 

  7. Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 2002, pp. 27–31 (2002)

    Google Scholar 

  8. Dahill, B., Levine, B.N., Royer, E., Shields, C.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP) (November 2002)

    Google Scholar 

  9. Yi, S., Naldurg, P., Kravets, R.: Security-Aware Ad Hoc Routing Protocol for Wireless Networks. In: The 6th World Multi-Conference on Systemics, Cybernetics and Informatics, SCI 2002 (2002)

    Google Scholar 

  10. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing. IETF RFC 3561 (2003)

    Google Scholar 

  11. Murphy, S., Badger, M., Wellington, B.: OSPF with Digital Signatures. RFC 2154 (June 1997)

    Google Scholar 

  12. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad hoc Networks. In: Proc. of the 6th International Conference on Mobile Computing and Networking (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, Z., Guo, W., Xu, F. (2005). Dependable Propagating Routing Information in MANET. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_81

Download citation

  • DOI: https://doi.org/10.1007/11534310_81

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28102-3

  • Online ISBN: 978-3-540-31868-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics