Abstract
Secure routing in ad hoc networks has been extensively studied in recent years. The vast majority of this work, however, has only focused on providing authenticity of the route. Availability of the network in a malicious environment has largely been ignored.
In this paper, we divide the secure routing problem into two layers. The first layer provides authenticated routing and the second layer provides a route selection algorithm that selects a route with the highest probability of successful delivery rather than the shortest route. We provide a metric for evaluating this probability. We provide simulation results that demonstrate that our approach increases the throughput by at least ten percent in a network where fifty percent of the nodes are malicious when compared to an approach that selects the shortest route. Furthermore, our approach incurs only a small delay when compared to the delay along the shortest route.
Portions of this work were funded by a Critical Infrastructure Grant from the U.S. National Institute of Standards and Technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. MobiCom (2002)
Hu, Y.-C., Johnson, D.B., Perrig, A.: Secure efficient distance vector routing in mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA) (June 2002)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: WiSe (2003)
Zapata, M.G., Asokan, N.: Securing ad hoc routing protocols. In: WiSe (2002)
Sanzgiri, K., Dahill, B.: A secure routing protocol for ad hoc networks. In: ICNP 2002 (2002)
Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness In Dynamic Ad-hoc Networks). In: MobiHoc 2002 (2002)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom 2000 (2000)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Buttyan, L., Hubaux, J.-P.: Enforcing service availability in mobile ad hoc WANs. In: Proceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston (August 2000)
Buttyan, L., Hubaux, J.-P.: Stimulating cooperation in self-organization mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications 8(5) (October 2003)
Jackobsson, M., Hubaux, J.-P., Buttyan, L.: A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In: Proceedings of Financial Cryptography (2003)
Zhong, S., Yang, Y.R., Chen, J.: Sprite: a simple, cheat-proof, credit-based system for mobile ad hoc networks. In: Proceedings of INFOOM. IEEE, Los Alamitos (2003)
Capkun, S., Hubaux, J.-P.: BISS: building secure routing out of an incomplete set of security associations. In: WiSe 2003 (2003)
Johnson, D., Maltz, D., Broch, J.: DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. In: Perkins, C.E. (ed.) Ad Hoc Networking, Ch. 5, pp. 139–172. Addison-Wesley, Reading (2001)
Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.-C., Jetcheva, J.: A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM 1998), Dallas, TX, USA, October 1998, pp. 85–97 (1998)
The Network Simulator ns-2, http://www.isi.edu/nsnam/ns/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yu, Z., Seng, CY., Jiang, T., Wu, X., Arbaugh, W.A. (2005). Robust Routing in Malicious Environment for Ad Hoc Networks. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2005. Lecture Notes in Computer Science, vol 3439. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31979-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-31979-5_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25584-0
Online ISBN: 978-3-540-31979-5
eBook Packages: Computer ScienceComputer Science (R0)