Skip to main content

Hop Chains: Secure Routing and the Establishment of Distinct Identities

  • Conference paper
Principles of Distributed Systems (OPODIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4305))

Included in the following conference series:

Abstract

We present a secure routing protocol that is immune to Sybil attacks, and that can tolerate initial collusion of Byzantine routers, or runtime collusion of non-adjacent Byzantine routers in the absence of collusion between adjacent routers. For these settings, the calculated distance from a destination to a node is not smaller than the actual shortest distance from the destination to the node. The protocol can also tolerate initial collusion of Byzantine routers and runtime collusion of adjacent Byzantine routers but in the absence of runtime collusion between non-adjacent routers. For this setting, there is a bound on how short the calculated distance is compared to the actual shortest distance. The protocol makes very weak timing assumptions and requires synchronization only between neighbors or second neighbors. We propose to use this protocol for secure localization of routers using hop-count distances, which can be then used as a proof of identity of nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: WiSE 2002: Proceedings of the 3rd ACM workshop on Wireless security, pp. 21–30. ACM Press, New York (2002)

    Chapter  Google Scholar 

  2. Bazzi, R., Konjevod, G.: On the stabilishment of distinct identities in overlay networks. In: Proceedings of ACM Symposium on Principles of Distributed Computing

    Google Scholar 

  3. Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)

    Google Scholar 

  4. Douceur, J.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  5. Fonseca, R., Ratnasamy, S., Zhao, J., Ee, C.T., Culler, D., Shenker, S., Stoica, I.: Beacon vector routing: Scalable point-to-point routing in wireless sensornets. In: Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005) (2005)

    Google Scholar 

  6. Hu, Y.-C., Johnson, D.B., Perrig, A.: Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002) (2002)

    Google Scholar 

  7. Hu, Y.-C., Perrig, A., Johnson, D.B.: Efficient security mechanisms for routing protocols. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium (NDSS 2003) (February 2003)

    Google Scholar 

  8. Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (April 2003)

    Google Scholar 

  9. Ng, T., Zhang, H.: Predicting internet network distance with coordinate-based approaches. In: Proceedings of INFOCOM (2002)

    Google Scholar 

  10. Pei, D., Massey, D., Zhang, L.: Detection of invalid routing announcements in the rip protocol. In: Proceedings of GLOBECOM 2003 (2003)

    Google Scholar 

  11. Tal, V.M., Vigna, G.: Sensor-based intrusion detection for intra-domain distance-vector routing. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 127–137. ACM Press, New York (2002)

    Google Scholar 

  12. Wan, T., Kranakis, E., Oorschot, P.V.: S-rip: A secure distance vector routing protocol. In: Proceedings of Applied Cryptography and Network Security (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bazzi, R.A., Choi, Yr., Gouda, M.G. (2006). Hop Chains: Secure Routing and the Establishment of Distinct Identities. In: Shvartsman, M.M.A.A. (eds) Principles of Distributed Systems. OPODIS 2006. Lecture Notes in Computer Science, vol 4305. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11945529_26

Download citation

  • DOI: https://doi.org/10.1007/11945529_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49990-9

  • Online ISBN: 978-3-540-49991-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics