Abstract
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the security of MANET is still a challenge issue. Although there are some existing security schemes such as ARAN (Athenticated Routing for Ad hoc Networks) protocol that makes use of cryptographic certificate to provide end-to-end authentication during routing phases, the overhead of security computation is still a serious hurdle for real application. In this paper, we propose a comparatively efficient scheme to perform ARAN protocol, based on AODV, by using one-time signature in place of conventional signature, aiming at achieving the same level of security but improved efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Burg, A.: Ad Hoc Network Specific Attacks (pdf). In: Seminar (ed.) Ad hoc networking: concepts, applications, and security, Technische Universität München (November 2003)
Hu, Y.C., Johnson, D., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks (pdf). In: 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), June 2002, pp. 3–13 (2002)
Hu, Y.C., Perrig, A., Johnson, D.: Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks (pdf). In: Proc. ACM MOBICOM (September 2002)
Hu, Y.C., Perrig, A., Johnson, D.B.: Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols (pdf). In: Proc. the 2003 ACM workshop on Wireless (September 2003)
Johnson, D.B., Maltz, D.A., Hu, Y.C.: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR). IETF INTERNET DRAFT, MANET working group, draft-ietf-manet-dsr-10.txt (July 2004)
Lamport, L.: Constructing digital signature from a one way function. Technical Report CSL-98, SRI International (October 1979)
Perkins, C.E., Royer, E.M., Das, S.R.: Ad Hoc On-Demand Distance Vector (AODV) Routing. IETF INTERNET DRAFT, MANET working group, Draft-ietf-manet-aodv-13.txt (February 2003)
Perrig, A.: The BiBa one-time signature and broadcast authentication protocol. In: 8th ACM Conference on Computer and Communication Security, pp. 28–37. ACM, New York (2001), November 508
Reyzin, L., Reyzin, N.: Better Than BIBA: Short One-Time Signatures With Fast Signing and Verifying (pdf). In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, p. 144. Springer, Heidelberg (2002)
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Royer, E.M.: A Secure Routing Protocol for Ad Hoc Networks (pdf). Technical Report: UM-CS-2002-032 (2002)
Varadharajan, V., Allen, P., Black, S.: An Analysis of the Proxy Problem in Distributed Systems (pdf). In: Proceedings of the IEEE Symposium on Security and Privacy, May 1991, pp. 255–275 (1991)
Zapata, M.G.: Secure Ad hoc On-Demand Distance Vector (SAODV) Routing. IETF INTERNET DRAFT, MANET working group, draft-guerrero-manet-saodv-02.txt (November 2004)
Zhang, K.: Efficient Protocols for Signing Routing Messages (pdf). In: Symposium on Network and Distributed Systems Security, NDSS 1998 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xu, S., Mu, Y., Susilo, W. (2005). Secure AODV Routing Protocol Using One-Time Signature. In: Jia, X., Wu, J., He, Y. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2005. Lecture Notes in Computer Science, vol 3794. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599463_29
Download citation
DOI: https://doi.org/10.1007/11599463_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30856-0
Online ISBN: 978-3-540-32276-4
eBook Packages: Computer ScienceComputer Science (R0)