Skip to main content

Abstract

Ad hoc networks are created dynamically and maintained by individual nodes comprising the network. They do not require a preexisting architecture for communication purposes and they do not rely on any type of wired infrastructure; in an ad hoc network, all communication occurs through a wireless medium. With current technology and the increasing popularity of notebook computers, interest in ad hoc networks has peaked. Future advances in technology will allow us to form small ad hoc networks on campuses, during conferences, and even in our own home environment. Further, the need for easily portable ad hoc networks in rescue missions and in situations in rough terrain are becoming extremely common.

In this chapter we investigate the principal security issues for protecting ad hoc networks at the data link and network layers. The security requirements for these two layers are identified and the design criteria for creating secure ad hoc networks using multiple lines of defense against malicious attacks are discussed. Furthermore, we explore challenge–response protocols based on symmetric and asymmetric techniques for multiple authentication purposes through simulations and present our experimental results. In Particular, we implement the Advanced Encryption Standard (AES), RSA, and message digest version 5 (MD5) algorithms in combination with ISO/IEC 9798-2 and ISO/IEC 9798-4, and Needham–Schroeder authentication protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 349.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 449.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 599.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N. Komninos, D. Vergados, C. Douligeris: Layered security design for mobile ad-hoc networks, J. Comput. Secur. 25(2), 121–130 (2006)

    Article  Google Scholar 

  2. N. Komninos, D. Vergados, C. Douligeris: Authentication in a layered security approach for mobile ad hoc networks, J. Comput. Secur. 26(5), 373–380 (2007)

    Article  Google Scholar 

  3. L. Zhou, Z.J. Haas: Securing ad hoc networks, IEEE Netw. Mag. 13(6), 24–30 (1999)

    Article  Google Scholar 

  4. J.-S. Lee, C.-C. Chang: Preserving data integrity in mobile ad hoc networks with variant Diffie–Hellman protocol, Secur. Commun. Netw. J. 1(4), 277–286 (2008)

    Article  MathSciNet  Google Scholar 

  5. A.J. Menezes, S.A. Vanstone, P.C. Van Oorschot: Handbook of Applied Cryptography (CRC Press, Boca Raton 2004)

    Google Scholar 

  6. L. Harn, J. Ren: Design of fully deniable authentication cervice for e-mail applications, IEEE Commun. Lett. 12(3), 219–221 (2008)

    Article  Google Scholar 

  7. X. Li, L. Zhiwei, A. Ye: Analysis and countermeasure of selfish node problem in mobile ad hoc network, 10th International Conference on Computer Supported Cooperative Work in Design (CSCWD’06), May 2006 (2006) 1–4

    Google Scholar 

  8. C. Basile, Z. Kalbarczyk, R.K. Iyer.: Inner-circle consistency for wireless ad hoc Networks, IEEE Trans. Mobile Comput. 6(1), 39–55 (2007)

    Article  Google Scholar 

  9. Y.-C. Hu, A. Perrig, D.B. Johnson.: Wormhole attacks in wireless networks, IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)

    Article  Google Scholar 

  10. B. Kannhavong, H. Nakayama, A. Jamalipour: SA-OLSR: Security aware optimized link state routing for mobile ad hoc networks, IEEE International Conference on Communications (ICC’08), 19–23 May 2008 (2008) 1464–1468

    Google Scholar 

  11. J. Dwoskin, D. Xu, J. Huang, M. Chiang, R. Lee: Secure key management architecture against sensor-node fabrication attacks, IEEE Global Telecommunications Conference (GLOBECOM’07), 26–30 Nov. 2007 (2007) 166–171

    Google Scholar 

  12. M. Hejmo, B.L. Mark, C. Zouridaki, R.K. Thomas: Design and analysis of a denial-of-service-resistant quality-of-service signaling protocol for MANETs, IEEE Trans. Vehic. Technol. 55(3), 743–751 (2006)

    Article  Google Scholar 

  13. C. Perkins: Ad Hoc Networking (Addison-Wesley, Boston, USA 2000)

    Google Scholar 

  14. S.P. Alampalayam, A. Kumar: Security model for routing attacks in mobile ad hoc networks, IEEE 58th Vehicular Technology Conference (VTC 2003-Fall), Vol. 3, 6–9 Oct. 2003 (2003) pp. 2122–2126

    Google Scholar 

  15. P. Papadimitratos, Z.J. Haas: Secure routing for mobile ad hoc networks, SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio (2002)

    Google Scholar 

  16. D. Johnson, Y. Hu, D. Maltz: Dynamic source routing, RFC 4728 (2007)

    Google Scholar 

  17. C. Perkins, E. Belding-Royer, S. Das: Ad hoc on-demand distance-vector routing (AODV), RFC 3561 (2003)

    Google Scholar 

  18. J. Hubaux, L. Buttyán, S. Capkun: The quest for security in mobile ad hoc networks, Proc. 2nd ACM international symposium on Mobile ad hoc networking and computing, USA (2001)

    Google Scholar 

  19. Y. Hu, A. Perrig, D. Johnson: Ariadne: A Secure on-demand routing protocol for ad hoc networks, ACM Workshop on Wireless Security (ACM MobiCom) (2002)

    Google Scholar 

  20. K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer: A secure routing protocol for ad hoc networks, Proc. 2002 IEEE Int. Conference on Network Protocols (ICNP), November 2002 (2002)

    Google Scholar 

  21. OPNET Technologies Inc.: http://www.opnet.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Komninos, N., Vergados, D., Douligeris, C. (2010). Security for Ad Hoc Networks. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04117-4_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04116-7

  • Online ISBN: 978-3-642-04117-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics