Abstract
In mobile ad hoc networks (MANETs), since all of the nodes communicate each other based on the routing protocol, and an attacker could manipulate a lower-level protocol to interrupt a security mechanism in a higher-level one, securing routing protocol is an important issue in MANETs. Recently, there exist several proposals that attempt to develop a secure routing protocol for MANETs. However, those methods are not actually secure against a variety of attacks, including the Sybil, wormhole, black hole, replay, blackmail, denial of service, and routing table poisoning attacks. Therefore, in this paper we design a secure hierarchical-clustering-based routing scheme using the self-certified public key cryptosystem, elliptic curve cryptosystem, pre-hashing, and nonce techniques against such attacks. Finally, we also analyze the advantages of our proposed scheme in terms of security and superiority.
This work was supported by the National Science Council of Republic of China under contract numbers NSC 95-2219-E-212-001 and NSC 95-2218-E-212-008.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wu, J., Stojmenovic, I.: Ad hoc networks. Computer 37(2), 29–31 (2004)
Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks challenges and solutions. IEEE Wireless Communications 11(1), 38–47 (2004)
Argyroudis, P.G., O’Mahony, D.: Secure routing for mobile ad hoc networks. IEEE Communications Surveys & Tutorials 7(3), 2–21 (2005)
Royer, E.M., Toh, C.K.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications 2(6), 46–55 (1999)
Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys & Tutorials 7(4), 2–28 (2005)
Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Communications Magazine 40(10), 70–75 (2002)
Milanovic, N., Malek, M., Davidson, A., Milutinovic, V.: Routing and security in mobile ad hoc networks. Computer 37(2), 61–65 (2004)
Zhang, C., Zhou, M.C., Yu, M.: Ad hoc network routing and security: a review. In: International Journal of Communication Systems (in press, 2006)
Hu, Y.C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Security and Privacy 2(3), 28–39 (2004)
Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 11(1-2), 21–38 (2005)
Johnson, D.B., Maltz, D.A., Hu, Y., Jetcheva, J.G.: The dynamic source routing protocol for mobile ad hoc networks (DSR). In: IETF Internet Draft (2002), http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-07.txt
Acs, G., Buttyan, L., Vajda, I.: Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing 5(11), 1533–1546 (2006)
Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications 24(2), 370–380 (2006)
Yu, J.Y., Chong, P.H.J.: A survey of clustering schemes for mobile ad hoc networks. IEEE Communications Surveys & Tutorials 7(1), 32–48 (2005)
Belding-Royer, E.M.: Multi-level hierarchies for scalable ad hoc routing. Wireless Networks 9(5), 461–478 (2003)
Keung, S., Siu, K.Y.: Efficient protocols secure against guessing and replay attacks. In: Proceedings of the International Conference on Computer Communications and Networks, pp. 105–112 (1995)
Lauter, K.: The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 11(1), 62–67 (2004)
Tsaur, W.J.: Several security schemes constructed using ECC-based self-certified public key cryptosystems. Applied Mathematics and Computation 168(1), 447–464 (2005)
Chatterjee, M., Das, S.K., Turgut, D.: On-demand weighted clustering algorithm (WCA) for ad hoc networks. In: Proceedings of IEEE Global Telecommunications Conference, pp. 1697–1701. IEEE Computer Society Press, Los Alamitos (2000)
Merkle, R.: One way hash functions and DES. In: Advances in Cryptology CRYPTO 1989. LNCS, pp. 428–446. Springer, Heidelberg (1990)
Tsaur, W.J., Pai, H.T.: Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile Ad Hoc Networks. In: Proceedings of the 2nd International Workshop on Intelligent Systems Techniques for Ad Hoc and Wireless Sensor Networks, in Conjunction with The Fifth International Symposium on Parallel and Distributed Processing and Applications (ISPA 2007), Canada (August 2007)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 56–73. IEEE Computer Society Press, Los Alamitos (2000)
Kanayama, N., Kobayashi, T., Saito, T., Uchiyama, S.: Remarks on elliptic curve discrete logarithm problems. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E83-A(1), 17–23 (2000)
Wu, B., Wu, J., Fernandez, E.B., Ilyas, M., Magliveras, S.: Secure and efficient key management in mobile ad hoc networks. Journal of Network and Computer Applications 30(3), 937–954 (2007)
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing mobile ad hoc networks with certificateless public keys. IEEE Transactions on Dependable and Secure Computing 3(4), 386–399 (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tsaur, WJ., Pai, HT. (2007). A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks. In: Thulasiraman, P., He, X., Xu, T.L., Denko, M.K., Thulasiram, R.K., Yang, L.T. (eds) Frontiers of High Performance Computing and Networking ISPA 2007 Workshops. ISPA 2007. Lecture Notes in Computer Science, vol 4743. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74767-3_53
Download citation
DOI: https://doi.org/10.1007/978-3-540-74767-3_53
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74766-6
Online ISBN: 978-3-540-74767-3
eBook Packages: Computer ScienceComputer Science (R0)