Skip to main content

A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks

  • Conference paper
Frontiers of High Performance Computing and Networking ISPA 2007 Workshops (ISPA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4743))

  • 925 Accesses

Abstract

In mobile ad hoc networks (MANETs), since all of the nodes communicate each other based on the routing protocol, and an attacker could manipulate a lower-level protocol to interrupt a security mechanism in a higher-level one, securing routing protocol is an important issue in MANETs. Recently, there exist several proposals that attempt to develop a secure routing protocol for MANETs. However, those methods are not actually secure against a variety of attacks, including the Sybil, wormhole, black hole, replay, blackmail, denial of service, and routing table poisoning attacks. Therefore, in this paper we design a secure hierarchical-clustering-based routing scheme using the self-certified public key cryptosystem, elliptic curve cryptosystem, pre-hashing, and nonce techniques against such attacks. Finally, we also analyze the advantages of our proposed scheme in terms of security and superiority.

This work was supported by the National Science Council of Republic of China under contract numbers NSC 95-2219-E-212-001 and NSC 95-2218-E-212-008.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wu, J., Stojmenovic, I.: Ad hoc networks. Computer 37(2), 29–31 (2004)

    Article  Google Scholar 

  2. Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks challenges and solutions. IEEE Wireless Communications 11(1), 38–47 (2004)

    Article  Google Scholar 

  3. Argyroudis, P.G., O’Mahony, D.: Secure routing for mobile ad hoc networks. IEEE Communications Surveys & Tutorials 7(3), 2–21 (2005)

    Article  Google Scholar 

  4. Royer, E.M., Toh, C.K.: A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications 2(6), 46–55 (1999)

    Article  Google Scholar 

  5. Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys & Tutorials 7(4), 2–28 (2005)

    Article  Google Scholar 

  6. Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Communications Magazine 40(10), 70–75 (2002)

    Article  Google Scholar 

  7. Milanovic, N., Malek, M., Davidson, A., Milutinovic, V.: Routing and security in mobile ad hoc networks. Computer 37(2), 61–65 (2004)

    Article  Google Scholar 

  8. Zhang, C., Zhou, M.C., Yu, M.: Ad hoc network routing and security: a review. In: International Journal of Communication Systems (in press, 2006)

    Google Scholar 

  9. Hu, Y.C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Security and Privacy 2(3), 28–39 (2004)

    Article  Google Scholar 

  10. Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 11(1-2), 21–38 (2005)

    Article  Google Scholar 

  11. Johnson, D.B., Maltz, D.A., Hu, Y., Jetcheva, J.G.: The dynamic source routing protocol for mobile ad hoc networks (DSR). In: IETF Internet Draft (2002), http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-07.txt

  12. Acs, G., Buttyan, L., Vajda, I.: Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing 5(11), 1533–1546 (2006)

    Article  Google Scholar 

  13. Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  14. Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications 24(2), 370–380 (2006)

    Article  Google Scholar 

  15. Yu, J.Y., Chong, P.H.J.: A survey of clustering schemes for mobile ad hoc networks. IEEE Communications Surveys & Tutorials 7(1), 32–48 (2005)

    Article  Google Scholar 

  16. Belding-Royer, E.M.: Multi-level hierarchies for scalable ad hoc routing. Wireless Networks 9(5), 461–478 (2003)

    Article  Google Scholar 

  17. Keung, S., Siu, K.Y.: Efficient protocols secure against guessing and replay attacks. In: Proceedings of the International Conference on Computer Communications and Networks, pp. 105–112 (1995)

    Google Scholar 

  18. Lauter, K.: The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 11(1), 62–67 (2004)

    Article  Google Scholar 

  19. Tsaur, W.J.: Several security schemes constructed using ECC-based self-certified public key cryptosystems. Applied Mathematics and Computation 168(1), 447–464 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  20. Chatterjee, M., Das, S.K., Turgut, D.: On-demand weighted clustering algorithm (WCA) for ad hoc networks. In: Proceedings of IEEE Global Telecommunications Conference, pp. 1697–1701. IEEE Computer Society Press, Los Alamitos (2000)

    Google Scholar 

  21. Merkle, R.: One way hash functions and DES. In: Advances in Cryptology CRYPTO 1989. LNCS, pp. 428–446. Springer, Heidelberg (1990)

    Google Scholar 

  22. Tsaur, W.J., Pai, H.T.: Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile Ad Hoc Networks. In: Proceedings of the 2nd International Workshop on Intelligent Systems Techniques for Ad Hoc and Wireless Sensor Networks, in Conjunction with The Fifth International Symposium on Parallel and Distributed Processing and Applications (ISPA 2007), Canada (August 2007)

    Google Scholar 

  23. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 56–73. IEEE Computer Society Press, Los Alamitos (2000)

    Google Scholar 

  24. Kanayama, N., Kobayashi, T., Saito, T., Uchiyama, S.: Remarks on elliptic curve discrete logarithm problems. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E83-A(1), 17–23 (2000)

    Google Scholar 

  25. Wu, B., Wu, J., Fernandez, E.B., Ilyas, M., Magliveras, S.: Secure and efficient key management in mobile ad hoc networks. Journal of Network and Computer Applications 30(3), 937–954 (2007)

    Article  Google Scholar 

  26. Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing mobile ad hoc networks with certificateless public keys. IEEE Transactions on Dependable and Secure Computing 3(4), 386–399 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Parimala Thulasiraman Xubin He Tony Li Xu Mieso K. Denko Ruppa K. Thulasiram Laurence T. Yang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tsaur, WJ., Pai, HT. (2007). A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks. In: Thulasiraman, P., He, X., Xu, T.L., Denko, M.K., Thulasiram, R.K., Yang, L.T. (eds) Frontiers of High Performance Computing and Networking ISPA 2007 Workshops. ISPA 2007. Lecture Notes in Computer Science, vol 4743. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74767-3_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74767-3_53

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74766-6

  • Online ISBN: 978-3-540-74767-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics