Skip to main content

Hash Chains at the Basis of a Secure Reactive Routing Protocol

  • Conference paper
Trusted Systems (INTRUST 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7222))

Included in the following conference series:

  • 845 Accesses

Abstract

Presently, the main concern of ad hoc routing protocols is no longer to find an optimal route to a given destination but to find the safe route free from malicious attackers. Several secure ad hoc routing protocols proposed, in the literature, are based on public key cryptography which drawback is to consume much more resources and decrease consequently network performances. In this paper, we propose a secure routing scheme for the DSR protocol. The proposed scheme combines the hash chains and digital signatures to provide a high level of security while reducing the costs of hop-by-hop signature generation and verification. The proposed protocol is analyzed using the NS-2 simulator.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ács, G., Buttyán, L., Vajda, I.: Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing 5(11), 1533–1546 (2006)

    Article  Google Scholar 

  2. Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., Rubens, H.: ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans. Inf. Syst. Secur. 10(3) (2007)

    Google Scholar 

  3. Awerbuch, B., Scheideler, C.: Robust random number generation for peer-to-peer systems. Theoretical Computer Science 410(6-7), 453–466 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  4. Burmester, M., De Medeiros, B.: On the Security of Route Discovery in MANETs. IEEE Transactions on Mobile Computing 8(9), 1180–1188 (2009)

    Article  Google Scholar 

  5. Buttyán, L., Vajda, I.: Towards provable security for ad hoc routing protocols. In: Setia, S., Swarup, V. (eds.) SASN, pp. 94–105. ACM (2004)

    Google Scholar 

  6. Cerri, D., Ghioni, A.: Securing AODV: The A-SAODV Secure Routing Prototype. IEEE Communications Magazine (February 2008)

    Google Scholar 

  7. Curtmola, R., Nita-Rotaru, C.: BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks. IEEE Transactions on Mobile Computing 8(4), 445–459 (2009)

    Article  Google Scholar 

  8. Eichler, S., Roman, C.: Challenges of Secure Routing in MANETs: A Simulative Approach using AODV-SEC. Technical Report: LKN-TR-2. Technische Universität München, Germany (2006)

    Google Scholar 

  9. Galice, S., Minier, M., Ubéda, S.: A Trust Protocol for Community Collaboration. In: Etalle, S., Marsh, S. (eds.) IFIPTM. IFIP, vol. 238, pp. 169–184. Springer, Boston (2007)

    Google Scholar 

  10. Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. In: Akyildiz, I.F., Lin, J.Y.-B., Jain, R., Bharghavan, V., Campbell, A.T. (eds.) MOBICOM, pp. 12–23. ACM (2002)

    Google Scholar 

  11. Hu, Y.-C., Perrig, A., Johnson, D.B.: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks 11(1-2), 21–38 (2005)

    Article  Google Scholar 

  12. Jin, L., Zhang, Z., Zhou, H.: Performance comparison of AODV, SAODV and FLSL routing protocols in mobile ad hoc network. In: 4th IEEE Consumer Communications and Networking Conference, CCNC 2007, pp. 479–483 (January 2007)

    Google Scholar 

  13. Jung, S., Lee, B., Talipov, E., Ahn, M.W., Kim, C.: Effects of Valid Source-Destination Edges for Node-Disjoint Multipaths on AD HOC Networks. In: MSV 2008, Las Vegas, USA, pp. 308–313 (2008)

    Google Scholar 

  14. Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. Mobile Computing, 153–181 (1996)

    Google Scholar 

  15. Johnson, D.B., Maltz, D.A., Hu, Y.C.: IETF RFC4728: The dynamic source routing protocol (DSR) for mobile ad hoc networks (February 2007)

    Google Scholar 

  16. Lamport, L.: Password Authentication with Insecure Communication. Communication of the ACM 24, 770–772 (1981)

    Article  Google Scholar 

  17. Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: URSA: Ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transactions on Networking 12(6), 1049–1063 (2004)

    Article  Google Scholar 

  18. Mallouli, W., Wehbi, B., Cavalli, A.R.: Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking. In: The 7th International Conference on AD-HOC Networks & Wireless, Sophia Antipolis, France, September 10-12 (2008)

    Google Scholar 

  19. Mishra, A.: Security and quality of service in ad hoc wireless network, pp. 3–106. Cambridge University Press, New York (2008)

    Book  Google Scholar 

  20. NS Manual. VINT Project (2008), http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf

  21. Naldurg, S., Yi, P., Kravets, R.: Security aware ad hoc routing for wireless networks. In: 2nd ACM Int. Symp. on Mobile Ad Hoc Networking & Computing, Long Beach, pp. 299–302. ACM Publisher, USA (2001)

    Google Scholar 

  22. Ning, P., Sun, K.: How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols. Ad Hoc Networks 3(6), 795–819 (2005)

    Article  Google Scholar 

  23. Orset, J.-M., Alcalde, B., Cavalli, A.: An EFSM-Based Intrusion Detection System for Ad Hoc Networks. In: Peled, D.A., Tsay, Y.-K. (eds.) ATVA 2005. LNCS, vol. 3707, pp. 400–413. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  24. Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: Proceedings of the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, USA, pp. 193–204 (January 2002)

    Google Scholar 

  25. Pirzada, A., McDonald, C., Datta, A.: Performance Comparison of Trust-Based Reactive Routing Protocols. IEEE Transactions on Mobile Computing 5(6) (June 2006)

    Google Scholar 

  26. Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: Authenticated routing for ad hoc networks. In: 10th IEEE International Conference on Network Protocols, Paris, France (2002)

    Google Scholar 

  27. Talipov, E., Jin, D., Jung, J., Ha, I., Choi, Y., Kim, C.: Path Hopping Based on Reverse AODV for Security. In: Kim, Y.-T., Takano, M. (eds.) APNOMS 2006. LNCS, vol. 4238, pp. 574–577. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  28. Tsaur, W.-J., Pai, H.-T.: A New Security Scheme for On-Demand Source Routing in Mobile Ad Hoc Networks. In: IWCMC 2007, Honolulu, Hawaii, USA, August 12-16, pp. 577–582 (2007)

    Google Scholar 

  29. Tseng, C.-Y.H.: Distributed Intrusion Detection Models For Mobile Ad Hoc Networks. PhD Thesis, University of California (2006)

    Google Scholar 

  30. Weimerskirch, A., Westhoff, D.: Zero Common-Knowledge Authentication for Pervasive Networks. In: Matsui, M., Zuccherato, R. (eds.) SAC 2003. LNCS, vol. 3006, pp. 73–87. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  31. Zapata, M.G.: Secure Ad hoc on Demand Distance Vector (SAODV) Routing. Mobile Ad Hoc Networking Working Group, Internet Draft (September 2005)

    Google Scholar 

  32. Zapata, M.G.: Key Management and Delayed Verification for Ad Hoc Networks. Journal of High Speed Networks 15(1), 93–109 (2006)

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bouabana-Tebibel, T. (2012). Hash Chains at the Basis of a Secure Reactive Routing Protocol. In: Chen, L., Yung, M., Zhu, L. (eds) Trusted Systems. INTRUST 2011. Lecture Notes in Computer Science, vol 7222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32298-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32298-3_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32297-6

  • Online ISBN: 978-3-642-32298-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics