Abstract
In wirelesss ad hoc networks basic network operations are carried out through the cooperation of all available nodes. Due to the inherent lack of a managed infrastructure the nodes of an ad hoc network cannot be considered as trustworthy as in a dedicated infrastructure. Wireless ad hoc networks are thus vulnerable to various exposures threatening the basic network operations like routing and packet forwarding. This paper presents a survey of current research activities dealing with routing security, cooperation enforcement and key management in wireless ad hoc networks. Existing solutions seem to only partially address the threats and fall short of providing a comprehensive answer. Wireless security mechanisms in layer 2 that are often considered as part of the solution domain do not meet the specific requirements of wireless ad hoc networks.
This research was partially supported by the Information Society Technologies program of the European Commission, Future and Emerging Technologies under the IST-2001-38113 MOBILEMAN project and by the Institut Eurecom.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Papadimitratos, P., Haas, Z.: Secure Routing for Mobile Ad Hoc Networks. In: Proceedings of CNDS 2002 (2002)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proceedings of MOBICOM 2002 (2002)
Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient and secure source authentication for multicast. In: Proceedings of NDSS 2001 (2001)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Symposium on Security and Privacy (2000)
Dahill, B., Levine, B.N., Royer, E., Shields, C.: ARAN: A secure Routing Protocol for Ad Hoc Networks, UMass Tech. Report 02-32 (2002)
Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In: The 4th IEEE Workshop on Mobile Computing Systems and Applications
Perkins, C.E., Bhagwat, P.: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In: Proceedings of SIGCOMM 1994 (1994)
Broch, J., Maltz, D.A., Johnson, D.B.: A performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In: Proceedings of MOBICOM 1998 (1998)
Johansson, P., Larsson, T., Hedman, N., Mielczarek, B., Degermark, M.: Scenario-based Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks. In: Proceedings of MOBICOM 1999 (1999)
Perrig, A., Hu, Y.-C., Johnson, D.B.: Wormhole Protection in Wireless Ad Hoc Networks, Technical Report TR01-384, Dep. Of Computer Science, Rice University
Michiardi, P., Molva, R.: Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks. In: Proceedings of European Wireless Conference (2002)
Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad Hoc Wireless Networks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, ch. 5, pp. 153–181. Kluwer Academic Publishers, Dordrecht (1996)
Perkins, C.: Ad hoc On Demand Distance Vector (AODV) Routing. Internet draft, draft-ietf-manet-aodv-00.txt
Buttyan, L., Hubaux, J.-P.: Nuglets: a virtual currency to stimulate cooperation in selforganizedad hoc networks, Technical Report DSC/2001/001, Swiss Federal Institute of Technology – Lausanne (2001)
Buchegger, S., Le Boudec, J.-Y.: Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In: Proceedings of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing
Buchegger, S., Le Boudec, J.-Y.: Performance Analysis of the CONFIDANT Protocol. In: Proceedings of MobiHoc 2002 (2002)
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of MOBICOM 2000 (2000)
Michiardi, P., Molva, R.: Core: A COllaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. In: IFIP – Communication and Multimedia Security Conference 2002 (2002)
Michiardi, P., Molva, R.: Game Theoretic Analysis of Security in Mobile Ad Hoc Networks, Institut Eurecom Research Report RR-02-070 – (April 2002)
Yang, H., Meng, X., Lu, S.: Self-Organized Network-Layer Security in Mobile Ad Hoc Networks
Capkun, S., Buttyan, L., Hubaux, J.-P.: Self-Organized Public-Key Management for Mobile Ad Hoc Networks. In: ACM International Workshop on Wireless Security, WiSe 2002 (2002)
Zimmermann, P.: The Official PGP User’s Guide. MIT Press, Cambridge (1995)
Reiter, M., Stybblebine, S.: Authentication metric analysis and design. ACM Transactions on Information and System Security (1999)
Luo, H., Lu, S.: Ubiquitous and Robust Authenticaion Services for Ad Hoc Wireless Networks, UCLA-CSD-TR-200030
Shamir, A.: How to share a secret. Communications of ACM (1979)
IEEE 802.11b-1999 Supplement to 802.11-1999. Wireless LAN MAC and PHY specifications: Higher speed Physical Layer (PHY) extension in the 2.4 GHz band
Specification of the Bluetooth System. Bluetooth Special Interest Group, Version 1.1, February 22 (2001), http://www.bluetooth.com/pdf/Bluetooth_11_Specifications_Book.pdf
Schneier, B.: Applied Cryptography. John Wiley & Sons, Chichester (1996)
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP, Stubblefield, Loannidis, and Rubin, AT&T Labs Technical Report (2001)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for manet. In: Proc. IEEE ICNP (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Molva, R., Michiardi, P. (2003). Security in Ad Hoc Networks. In: Conti, M., Giordano, S., Gregori, E., Olariu, S. (eds) Personal Wireless Communications. PWC 2003. Lecture Notes in Computer Science, vol 2775. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39867-7_69
Download citation
DOI: https://doi.org/10.1007/978-3-540-39867-7_69
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20123-6
Online ISBN: 978-3-540-39867-7
eBook Packages: Springer Book Archive