Skip to main content
Log in

A secure routing model based on distance vector routing algorithm

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

Distance vector routing protocols have been widely adopted as an efficient routing mechanism in current Internet, and many wireless networks. However, as is well-known, the existing distance vector routing protocols are insecure as it lacks of effective authorization mechanisms and routing updates aggregated from other routers. As a result, the network routing-based attacks become a critical issue which could lead to a more deteriorate performance than other general network attacks. To efficiently address this issue, this paper, through analyzing the routing model and its security aspect, and presents a novel approach on guaranteeing the routing security. Based on the model, we present the security mechanism including the message exchange and update message security authentication mechanism. The suggested approach shows that the security mechanism can effectively verify the integrity and validate the freshness of routing update messages received from neighbor nodes. In comparison with exiting mechanisms (SDV, S-RIP etc), the proposed model provides enhanced security without introducing significant network overheads and complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bellovin S.M. Security problems in the TCP/IP protocol suite. Comput Commun Rev, 1989, 19: 32–48

    Article  Google Scholar 

  2. Kuo C F, Pang A C, Chan S K. Dynamic routing with security considerations. IEEE Trans Parallel Distrib Syst, 2009, 20: 48–58

    Article  Google Scholar 

  3. He L. Recent developments in securing Internet routing protocols. BT Technol J, 2006, 24: 180–196

    Article  Google Scholar 

  4. Lakshminarayanan K, Caesar M, Rangan M, et al. Achieving convergence-free routing using failure-carrying packets. In: ACM SIGCOMM 2007. New York: ACM Press, 2007. 241–252

    Google Scholar 

  5. Wang B, Guo Y F, Lan J L, et al. Fast network self-healing mechanism based on distance vector routing protocol. J Internet Technol, 2010, 11: 659–667

    Google Scholar 

  6. Kim H, Shin G. On predictive routing of security contexts in an all-IP network. Secur Commun Netw, 2010, 3: 4–15

    Google Scholar 

  7. Rick K, Simon L, Hart R. Practical interdomain routing security. IT Prof, 2009, 11: 54–56

    Google Scholar 

  8. Jun L, Brooks S. I-seismograph: Observing and measuring Internet earthquakes. In: IEEE INFOCOM 2011. Washington: IEEE Computer Society, 2011. 2624–2632

    Google Scholar 

  9. Bellman R. On a routing problem. Q Appl Math, 1958, XVI: 87–90

    Google Scholar 

  10. Yi Q, James J, David T, et al. Information Assurance: Dependability and Security in Networked Systems. San Fransisco: Morgan Kaufmann Publishers, 2007

    Google Scholar 

  11. Haim Z, Levy H. Area avoidance routing in distance-vector networks. In: Proc of IEEE INFOCOM. Washington: IEEE Computer Society, 2008. 475–483

    Google Scholar 

  12. Mittal V, Vigna G. Sensor-based intrusion detection for intra-domain distance-vector routing. In: Proc of CCS'02. Washington: IEEE Computer Society, 2002. 127–137

    Chapter  Google Scholar 

  13. Hu Y C, Perrig A, Johnson D B. Efficient security mechanisms for routing protocols. In: Proc NDSS'03. San Diego: IEEE Computer Society, 2003. 1–17

    Google Scholar 

  14. Tao W, Kranakis E, Oorschot P. S-RIP: A secure distance vector routing protocol. In: Proc of 2006 Securecomm and Workshops. Washington: IEEE Computer Society, 2006. 103–109

    Google Scholar 

  15. Babakhouya A, Challal Y, Bouabdallah M, et al. SDV: A new approach to secure distance vector routing protocols. In: Proc of 2006 Securecomm and Workshops. Washington: IEEE Computer Society, 2006. 1–10

    Chapter  Google Scholar 

  16. Sheng B, Wang H N, Pan J P. Keychain-based signatures for securing BGP. IEEE J Sel Areas Commun, 2010, 28: 1308–1318

    Article  Google Scholar 

  17. Neven G. Efficient sequential aggregate signed data. IEEE Trans Inf Theory, 2011, 57: 1803–1815

    Article  MathSciNet  Google Scholar 

  18. Zhang L, Qina B, Wu Q H, et al. Efficient many-to-one authentication with certificateless aggregate signatures. Comput Netw, 2010, 54: 2482–2491

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bin Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, B., Wu, C., Yang, Q. et al. A secure routing model based on distance vector routing algorithm. Sci. China Inf. Sci. 57, 1–13 (2014). https://doi.org/10.1007/s11432-012-4659-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-012-4659-7

Keywords

Navigation