Skip to main content

Robust Routing in Malicious Environment for Ad Hoc Networks

  • Conference paper
Book cover Information Security Practice and Experience (ISPEC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3439))

  • 959 Accesses

Abstract

Secure routing in ad hoc networks has been extensively studied in recent years. The vast majority of this work, however, has only focused on providing authenticity of the route. Availability of the network in a malicious environment has largely been ignored.

In this paper, we divide the secure routing problem into two layers. The first layer provides authenticated routing and the second layer provides a route selection algorithm that selects a route with the highest probability of successful delivery rather than the shortest route. We provide a metric for evaluating this probability. We provide simulation results that demonstrate that our approach increases the throughput by at least ten percent in a network where fifty percent of the nodes are malicious when compared to an approach that selects the shortest route. Furthermore, our approach incurs only a small delay when compared to the delay along the shortest route.

Portions of this work were funded by a Critical Infrastructure Grant from the U.S. National Institute of Standards and Technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. MobiCom (2002)

    Google Scholar 

  2. Hu, Y.-C., Johnson, D.B., Perrig, A.: Secure efficient distance vector routing in mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA) (June 2002)

    Google Scholar 

  3. Hu, Y.-C., Perrig, A., Johnson, D.B.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: WiSe (2003)

    Google Scholar 

  4. Zapata, M.G., Asokan, N.: Securing ad hoc routing protocols. In: WiSe (2002)

    Google Scholar 

  5. Sanzgiri, K., Dahill, B.: A secure routing protocol for ad hoc networks. In: ICNP 2002 (2002)

    Google Scholar 

  6. Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness In Dynamic Ad-hoc Networks). In: MobiHoc 2002 (2002)

    Google Scholar 

  7. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom 2000 (2000)

    Google Scholar 

  8. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Buttyan, L., Hubaux, J.-P.: Enforcing service availability in mobile ad hoc WANs. In: Proceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston (August 2000)

    Google Scholar 

  10. Buttyan, L., Hubaux, J.-P.: Stimulating cooperation in self-organization mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications 8(5) (October 2003)

    Google Scholar 

  11. Jackobsson, M., Hubaux, J.-P., Buttyan, L.: A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In: Proceedings of Financial Cryptography (2003)

    Google Scholar 

  12. Zhong, S., Yang, Y.R., Chen, J.: Sprite: a simple, cheat-proof, credit-based system for mobile ad hoc networks. In: Proceedings of INFOOM. IEEE, Los Alamitos (2003)

    Google Scholar 

  13. Capkun, S., Hubaux, J.-P.: BISS: building secure routing out of an incomplete set of security associations. In: WiSe 2003 (2003)

    Google Scholar 

  14. Johnson, D., Maltz, D., Broch, J.: DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. In: Perkins, C.E. (ed.) Ad Hoc Networking, Ch. 5, pp. 139–172. Addison-Wesley, Reading (2001)

    Google Scholar 

  15. Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.-C., Jetcheva, J.: A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM 1998), Dallas, TX, USA, October 1998, pp. 85–97 (1998)

    Google Scholar 

  16. The Network Simulator ns-2, http://www.isi.edu/nsnam/ns/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yu, Z., Seng, CY., Jiang, T., Wu, X., Arbaugh, W.A. (2005). Robust Routing in Malicious Environment for Ad Hoc Networks. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2005. Lecture Notes in Computer Science, vol 3439. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31979-5_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31979-5_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25584-0

  • Online ISBN: 978-3-540-31979-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics