Skip to main content

Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3158))

Abstract

Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threats. Flooding is a robust algorithm but, because of its extreme redundancy, it is impractical in dense networks. Indeed in large wireless networks, the use of flooding algorithms may lead to a broadcast storm in which the number of collisions is so large that we get system failure. Further reducing unnecessary transmissions greatly improves energy efficiency of such networks. Several variants have been proposed to reduce the relay overhead either deterministically or probabilistically. Gossip is a probabilistic algorithm, in which packet relaying is based on the outcome of coin tosses. The relay probability can be fixed, dynamic or adaptive. With dynamic Gossip, local information (local connectivity) is used. With adaptive Gossip, the decision to relay is adjusted adaptively based on the outcome of coin tosses, the local network structure and the local response to the flooding call. The goal of gossiping is to minimize the number of relays, while retaining the main benefits of flooding, i.e., effective distance.

In this paper we consider ways to reduce the number of redundant transmissions in broadcast flooding while guaranteeing security. We present several gossip type protocols, which exploit local connectivity and adaptively correct local relay failures. These use a (geodesic) cell based approach and preserve cell-distance. Our last two protocols are non probabilistic and guarantee delivery, the first such protocols to the best of our knowledge.

This material is based on work supported in part by the U.S. Army Research Laboratory and the U.S. Research Office under grant number DAAD19-02-1-0235.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Awerbuch, B., Holmer, D., Nita-Rotaru, C., Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: ACM Workshop on Wireless Security (WiSe 2002) (September 2002)

    Google Scholar 

  2. Belding-Royer, E.M., Toh, C.-K.: A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications Magazine, 46–55 (April 1999)

    Google Scholar 

  3. Broch, J., et al.: A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proc. ACM MOBICOM, pp. 85–97 (1998)

    Google Scholar 

  4. Burmester, M., van Le, T.: Tracing Byzantine faults in ad hoc networks. In: Proceedings, Computer, Network and Information Security 2003, New York, December 10-12 (2003)

    Google Scholar 

  5. Burmester, M., van Le, T.: Secure Multipath Communication in Mobile Ad hoc Networks. In: International Conference on Information Technology, Coding and Computing, Las Vegas Nevada, April 5-7 (2004)

    Google Scholar 

  6. Burmester, M., Yasinsac, A.: Trust Infrastructures for Wireless, Mobile Networks. WSEAS Transactions on Telecommunications (January 2004)

    Google Scholar 

  7. Capkun, S., Hambdi, M., Hubaux, J.: Gps-free positioning in mobile ad hoc networks. In: Proceedings of Hawaii Int. Conf. on System Sciences (January 2001)

    Google Scholar 

  8. Cartigny, J., Simplot, D.: Border Node Retransmission Based Probabilistic Broadcast Protocols in Ad-Hoc Networks. In: Proc. 36th International Hawaii International Conference on System Sciences (HICSS 2003), Hawaii, USA (2003)

    Google Scholar 

  9. Corson, S., Macker, J.: Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, RFC2501 (January 1999)

    Google Scholar 

  10. Haas, Z.J., Halpern, J.Y., Li, L.: Gossip-based ad hoc routing. In: Proc. of INFOCOM 2002, pp. 1707–1716 (2002)

    Google Scholar 

  11. Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad-Hoc Wireless Networks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, pp. 152–181. Kluwer Academic Publisher, Dordrecht (1996)

    Google Scholar 

  12. Karpijoki, V.: Signalling and Routing Security in Mobile Ad Hoc Networks. In: Proceedings of the Helsinki University of Technology, Seminar on Internetworking - Ad Hoc Networks (Spring 2000)

    Google Scholar 

  13. Karp, B., Kung, H.: Greedy Perimeter Stateless Routing for Wireless Networks. In: Proceedings of the 6th International Conference on Mobile Computing and Networking, Boston, USA, pp. 243–254 (2000)

    Google Scholar 

  14. Ko, Y.B., Vaidya, N.H.: Location-Aided Routing in Mobile Ad Hoc Networks. In: Proceedings of ACM/IEEE MOBICOM 1998 (October 1998)

    Google Scholar 

  15. Ni, S.-Y., Tseng, Y.-C., Chen, Y.-S., Sheu, J.-P.: The broadcast storm problem in a mobile ad hoc network. In: Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, August 1999, pp. 151–162 (1999)

    Google Scholar 

  16. Okamoto, M.: Some inequalities relating to the partial sum of binomial probabilities. Annals of the Institute of Statistical Mathematics 10, 29–35 (1958)

    Article  MATH  MathSciNet  Google Scholar 

  17. Perkins, C.E., Royer, E.M., Das, S.R.: IP Flooding in ad hoc networks. Internet draft (draft-ietf-manet-bcast-00.txt) (November 2001) (Work in progress)

    Google Scholar 

  18. Perkins, C.E., Royer, E.M.: Ad hoc on-demand distance vector routing. In: IEEE Workshop on Mobile Computing Systems and Applications, February 1999, pp. 90–100 (1999)

    Google Scholar 

  19. Royer, E., Toh, C.-K.: A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks. IEEE Personal Communications Magazine, 46–55 (April 1999)

    Google Scholar 

  20. Sasson, Y., Cavin, D., Schiper, A.: Probabilistic Broadcast for Flooding in Wireless Mobile Ad hoc Networks. In: Proc. of IEEE WCNC 2003 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Burmester, M., Van Le, T., Yasinsac, A. (2004). Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks. In: Nikolaidis, I., Barbeau, M., Kranakis, E. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2004. Lecture Notes in Computer Science, vol 3158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-28634-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-28634-9_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22543-0

  • Online ISBN: 978-3-540-28634-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics