Skip to main content

Secure and Scalable Routing Protocol for Mobile Ad-Hoc Networks

  • Conference paper
Mobility Aware Technologies and Applications (MATA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3744))

Abstract

This paper is intended to find an efficient way to support secure and scalable routing mechanism well suited for Mobile Ad hoc Networks (MANET). Support of secure routing protocol is prerequisite for launching a secure communication in the presence of adversaries. To do this, we first propose a zone networking architecture based on zone masters that allow ordinary nodes to discover a feasible route to the destination in a scalable manner. On the basis of the architecture, secure routing protocol is given. Moreover, we also propose to use short-lived key(s) to overcome the performance degradation caused by applying expensive digital signature to our scheme.

This research is supported by the ubiquitous Autonomic Computing and Network Project, the Ministry of Information and Communication (MIC) 21st Century Frontier R&D Program in Korea.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Royer, E.M., Barbara, S., Toh, C.K.: A Review of Current Routing Protocols for Ad hoc Mobile Wireless Networks. IEEE Personal Communications, 46–55 (1999)

    Google Scholar 

  2. Hong, X., Xu, K., Gerla, M.: Scalable Routing Protocols for Mobile Ad Hoc Networks. IEEE Network Magazine 16, 11–21 (2002)

    Article  Google Scholar 

  3. Michiardi, P., Molva, R.: Ad hoc network security. ST Journal of System Research 4(1) (March 2003)

    Google Scholar 

  4. Haas, Z.J., Pearlman, M.R.: The Zone Routing Protocol (ZRP) for Ad Hoc Networks. IETF Internet Draft (1998)

    Google Scholar 

  5. Ko, Y.B., Vaidya, N.H.: Location-aided Routing (LAR) in Mobile Ad Hoc Networks. In: ACM/IEEE Int’l. Conf. Mobile Comp. Net., pp. 66–75 (1998)

    Google Scholar 

  6. Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In: Proc. of IEEE WMCSA (June 2002)

    Google Scholar 

  7. Dahill, B., Levine, B.N., Royer, E., Shields, C.: ARAN: A secure Routing Protocol for Ad Hoc Networks, UMass Tech Report 02-32 (2002)

    Google Scholar 

  8. Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks. In: proc. of MOBICOM (2002)

    Google Scholar 

  9. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: IEEE Security and Privacy Symposium (May 2000)

    Google Scholar 

  10. Lenstra, A.K., Verheul, E.R.: Selecting cryptographic key sizes. Journal of Cryptology 14(4), 255–293 (2001)

    MATH  MathSciNet  Google Scholar 

  11. Crypto++ class library, http://www.eskimo.com/~weidai/cryptlib.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kang, N., Park, I., Kim, Y. (2005). Secure and Scalable Routing Protocol for Mobile Ad-Hoc Networks. In: Magedanz, T., Karmouch, A., Pierre, S., Venieris, I. (eds) Mobility Aware Technologies and Applications. MATA 2005. Lecture Notes in Computer Science, vol 3744. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11569510_32

Download citation

  • DOI: https://doi.org/10.1007/11569510_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29410-8

  • Online ISBN: 978-3-540-32031-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics