Abstract
This paper is intended to find an efficient way to support secure and scalable routing mechanism well suited for Mobile Ad hoc Networks (MANET). Support of secure routing protocol is prerequisite for launching a secure communication in the presence of adversaries. To do this, we first propose a zone networking architecture based on zone masters that allow ordinary nodes to discover a feasible route to the destination in a scalable manner. On the basis of the architecture, secure routing protocol is given. Moreover, we also propose to use short-lived key(s) to overcome the performance degradation caused by applying expensive digital signature to our scheme.
This research is supported by the ubiquitous Autonomic Computing and Network Project, the Ministry of Information and Communication (MIC) 21st Century Frontier R&D Program in Korea.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Royer, E.M., Barbara, S., Toh, C.K.: A Review of Current Routing Protocols for Ad hoc Mobile Wireless Networks. IEEE Personal Communications, 46–55 (1999)
Hong, X., Xu, K., Gerla, M.: Scalable Routing Protocols for Mobile Ad Hoc Networks. IEEE Network Magazine 16, 11–21 (2002)
Michiardi, P., Molva, R.: Ad hoc network security. ST Journal of System Research 4(1) (March 2003)
Haas, Z.J., Pearlman, M.R.: The Zone Routing Protocol (ZRP) for Ad Hoc Networks. IETF Internet Draft (1998)
Ko, Y.B., Vaidya, N.H.: Location-aided Routing (LAR) in Mobile Ad Hoc Networks. In: ACM/IEEE Int’l. Conf. Mobile Comp. Net., pp. 66–75 (1998)
Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In: Proc. of IEEE WMCSA (June 2002)
Dahill, B., Levine, B.N., Royer, E., Shields, C.: ARAN: A secure Routing Protocol for Ad Hoc Networks, UMass Tech Report 02-32 (2002)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks. In: proc. of MOBICOM (2002)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: IEEE Security and Privacy Symposium (May 2000)
Lenstra, A.K., Verheul, E.R.: Selecting cryptographic key sizes. Journal of Cryptology 14(4), 255–293 (2001)
Crypto++ class library, http://www.eskimo.com/~weidai/cryptlib.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kang, N., Park, I., Kim, Y. (2005). Secure and Scalable Routing Protocol for Mobile Ad-Hoc Networks. In: Magedanz, T., Karmouch, A., Pierre, S., Venieris, I. (eds) Mobility Aware Technologies and Applications. MATA 2005. Lecture Notes in Computer Science, vol 3744. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11569510_32
Download citation
DOI: https://doi.org/10.1007/11569510_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29410-8
Online ISBN: 978-3-540-32031-9
eBook Packages: Computer ScienceComputer Science (R0)