Skip to main content
Log in

Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

We have designed an authenticated link-level ad hoc routing protocol and integrated it with the Portland State University implementation of Mobile-IP. The routing protocol addresses link security issues. In our protocol, mobile nodes, as well as agents, broadcast ICMP router discovery packets. The router discovery packets are authenticated and bind the sender's MAC and IP addresses. Problems caused by tying IP subnet schemes to routing on radio links are eliminated. Security problems associated with ARP spoofing are also reduced. This link-level protocol is integrated with Mobile-IP on links where increased security is needed. The protocol replaces ARP, and may be integrated with higher-level multi-hop ad hoc routing protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. R. Atkinson, Security architecture for the Internet Protocol, Request for comments, RFC 1825, Internet Engineering Task Force, Naval Research Labs (August 1995).

  2. S.M. Bellovin, Security problems in the TCP/IP protocol suite, ACM Computer Communications Review 19(2) (March 1989).

  3. R. Caceres and V.N. Padmanabhan, Fast and scalable handoffs for wireless internetworks, in: Proceedings of ACM MobiCom (1996).

  4. D. Comer, Internetworking with TCP/IP, Vol. 1 (Prentice-Hall, Englewood Cliffs, NJ, 1991) pp. 150–151.

    Google Scholar 

  5. S. Deering, ICMP Router discovery messages, Request for comments, RFC 1256, Internet Engineering Task Force, Xerox PARC (September 1991).

  6. W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory 6 (1976) 644–654.

    Google Scholar 

  7. C. Huitema, Routing in the Internet (Prentice-Hall, Englewood Cliffs, NJ, 1995) chapter 5.

    Google Scholar 

  8. D. Johnson and D. Maltz, Dynamic source routing in ad hoc wireless networks, Mobile Computing (1996).

  9. G. Malkin, RIP version 2 carrying additional information, Request for comments, RFC 1723, Internet Engineering Task Force, Xylogics, Inc. (November 1994).

  10. D. Mills, Network Time Protocol (Version 3), Request for comments, RFC 1305, Internet Engineering Task Force, University of Delaware (March 1992).

  11. J. Moy, OSPF Version 2, Request for comments, RFC 2178, Internet Engineering Task Force, Cascade Communications Corp. (July 1997).

  12. C. Perkins, IP Mobility support, Request for comments, RFC 2002, Internet Engineering Task Force, IBM (October 1996).

  13. R. Perlman, Interconnections: Bridges and Routers (Addison-Wesley, Reading, MA, 1992) pp. 195–198.

    Google Scholar 

  14. D.C. Plummer, An Ethernet address resolution protocol, Request for comments, RFC 826, Internet Engineering Task Force, Symbolics Inc. (1982).

  15. R. Rivest, The MD5 message-digest algorithm, Request for comments, RFC 1321, Internet Engineering Task Force (April 1992).

  16. W.R. Stevens, TCP/IP Illustrated, Vol. I (Addison-Wesley, New York, 1994) p. 227.

    Google Scholar 

  17. J. Zao, S. Kent, J. Gahm, G. Troxel, M. Condell, P. Helinek, N. Yuan and I. Castineyra, A public-key based secure Mobile-IP, MobiCom97 (September 1997).

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Binkley, J., Trost, W. Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems. Wireless Networks 7, 139–145 (2001). https://doi.org/10.1023/A:1016633521987

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1016633521987

Navigation