skip to main content
10.1145/1029102.1029120acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Securing quality-of-service route discovery in on-demand routing for ad hoc networks

Published: 25 October 2004 Publication History

Abstract

An ad hoc network is a collection of computers (nodes) that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use demanding applications such as videoconferencing, Voice over IP, and streaming media when they are connected through an ad~hoc network. Because overprovisioning, a common technique in wired networks, is often impractical in wireless networks for reasons such as power, cost, and government regulation, Quality of Service (QoS) routing is even more important in wireless networks than in wired networks. Though a number of QoS-routing protocols have been proposed for use in ad~hoc networks, security of such protocols has not been considered.
In this paper, we develop SQoS, a secure form of QoS-Guided Route Discovery for on-demand ad~hoc network routing. SQoS relies entirely on <i>symmetric</i> cryptography. Symmetric cryptographic primitives are three to four orders of magnitude faster (in computation time) than asymmetric cryptography. In addition, we show that in general, existing QoS-Guided Route Discovery can, for a single Route Discovery, transmit a number of packets exponential in the number of network nodes, creating an opportunity for Denial-of-Service (DoS) attacks. SQoS limits this overhead to be linear in the number of network nodes by providing the source with control over which Route Requests are forwarded.

References

[1]
Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru, and Herbert Rubens. An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In ACM Workshop on Wireless Security (WiSe), September 2002.]]
[2]
John Bellardo and Stefan Savage. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In Proceedings of the USENIX Security Symposium, pages 15--27, August 2003.]]
[3]
Bhargav Bellur and Richard G. Ogier. A Reliable, Efficient Topology Broadcast Protocol for Dynamic Networks. In Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '99), pages 178--186, March 1999.]]
[4]
Bob Braden, David Clark, and Scott Shenker. Integrated Services in the Internet Architecture: an Overview. RFC 1633, June 1994.]]
[5]
Josh Broch, David B. Johnson, and David A. Maltz. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. Internet-Draft, draft-ietf-manet-dsr-03. txt, October 1999. Work in progress. Available from http://www.monarch.cs.rice.edu/internet-drafts/draft-ietf-manet-dsr-03.txt.]]
[6]
Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In Proceedings of the Fourth Annual International Conference on Mobile Computing and Networking (MobiCom 1998), pages 85--97, October 1998.]]
[7]
Derya H. Cansever, Arnold M. Michelson, and Allen H. Levesque. Quality of Service Support in Mobile Ad-Hoc IP Networks. In Proceedings of the Military Communications Conference (MILCOM 1999), pages 30--34, October 1999.]]
[8]
Shigang Chen and K. Nahrstedt. Distributed Quality-of-Service Routing in Ad Hoc Networks. IEEE Journal on Selected Areas in Communications, 17(8):1488--1505, August 1999.]]
[9]
Don Coppersmith and Markus Jakobsson. Almost Optimal Hash Sequence Traversal. In Proceedings of the Fourth Conference on Financial Cryptography (FC '02), Lecture Notes in Computer Science, 2002.]]
[10]
Douglas S. J. De Couto, Daniel Aguayo, John Bicket, and Robert Morris. A High-Throughput Path Metric for Multi-Hop Wireless Routing. In Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking (MobiCom 2003), pages 134--146, September 2003.]]
[11]
Joan Daemen and Vincent Rijmen. AES Proposal: Rijndael, March 1999.]]
[12]
Shimon Even, Oded Goldreich, and Silvio Micali. Online/ off-line digital signatures. In Advances in Cryptology - CRYPTO '89, edited by Gilles Brassard, pages 263--277. Springer-Verlag, 1989. Lecture Notes in Computer Science Volume 435.]]
[13]
Brian Gladman. Cryptography Technology: Implementations of AES (Rijndael) in C/C++ and Assembler, June 2002. Available at http://fp.gladman. plus.com/cryptography_technology/rijndael/.]]
[14]
Neil M. Haller. The S/KEY One-Time Password System. In Proceedings of the 1994 Symposium on Network and Distributed Systems Security (NDSS '94), pages 151--157, February 1994.]]
[15]
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Efficient Security Mechanisms for Routing Protocols. In Proceedings of the 2003 Symposium on Network and Distributed Systems Security (NDSS '03), February 2003.]]
[16]
Yih-Chun Hu and David B. Johnson. Implicit Source Routing in On-Demand Ad Hoc Network Routing. In Proceedings of the Second Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), pages 1-10, October 2001.]]
[17]
Yih-Chun Hu, David B. Johnson, and Adrian Perrig. SEAD: Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks. In Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02), pages 3--13, June 2002.]]
[18]
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), pages 12--23, September 2002.]]
[19]
Per Johansson, Tony Larsson, Nicklas Hedman, Bartosz Mielczarek, and Mikael Degermark. Scenario-based Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks. In Proceedings of the Fifth Annual International Conference on Mobile Computing and Networking (MobiCom 1999), pages 195--206, August 1999.]]
[20]
David B. Johnson. Routing in Ad Hoc Networks of Mobile Hosts. In Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'94), pages 158--163, December 1994.]]
[21]
David B. Johnson and David A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153--181. Kluwer Academic Publishers, 1996.]]
[22]
David B. Johnson, David A. Maltz, and Yih-Chun Hu. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. Internet-Draft, draft-ietf-manet-dsr-09. txt, April 2003. Work in progress.]]
[23]
Leslie Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770--772, November 1981.]]
[24]
Seoung-Bum Lee and Andrew T. Campbell. INSIGNIA: In-Band Signaling Support for QoS in Mobile Ad Hoc Networks. In Proceedings of the 5th International Workshop on Mobile Multimedia Communications (MoMuC'98), October 1998.]]
[25]
David A.Maltz. ResourceManagement inMulti-hop Ad Ho Networks. Technical Report CMU-CS-00-150, School of Computer Science, Carnegie Mellon University, 1999.]]
[26]
Stephen Matyas, Carl Meyer, and Jonathan Oseas. Generating Strong One-Way Functions with Cryptographic Algorithm. IBM Technical Disclosure Bulletin, 27:5658--5659, 1985.]]
[27]
Ralph C.Merkle. A digital signature based on a conventional encryption function. In Advances in Cryptology - CRYPTO '87, edited by Carl Pomerance, pages 369--378, Berlin, 1987. Springer-Verlag. Lecture Notes in Computer Science Volume 293.]]
[28]
Ralph C.Merkle. A certified digital signature. In Advances in Cryptology - CRYPTO'89, edited by Gilles Brassard, pages 218--238, Berlin, 1989. Springer-Verlag. Lecture Notes in Computer Science Volume 435.]]
[29]
George C. Necula and Peter Lee. Safe Kernel Extensions Without Run-Time Checking. In Proceedings of the 2nd Symposium on Operating Systems Design and Implementation (OSDI '96), pages 229--243, October 1996.]]
[30]
Kathleen Nichols, Steven Blake, Fred Baker, and David L. Black. Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. RFC 2474, December 1998.]]
[31]
Charles E. Perkins and Elizabeth M. Royer. Ad-Hoc On- Demand Distance Vector Routing. In Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'99), pages 90--100, February 1999.]]
[32]
Charles E. Perkins, Elizabeth M. Royer, and Samir R. Das. Quality of Service for Ad hoc On-Demand Distance Vector Routing. Internet-Draft, draft-ietf-manet-aodvqos-00. txt, July 2000. Work in progress.]]
[33]
Amir Qayyum, Laurent Viennot, and Anis Laouiti. Multipoint Relaying: An Efficient Technique for flooding in Mobile Wireless Networks. Technical Report Research Report RR-3898, INRIA, February 2000.]]
[34]
Leonid Reyzin and Natan Reyzin. Better than Biba: Short One-Time Signatures with Fast Signing and Verifying. In Information Security and Privacy - 7th Australasian Conference (ACSIP 2002), edited by Jennifer Seberry, number 2384 in Lecture Notes in Computer Science. Springer- Verlag, July 2002.]]
[35]
Pankaj Rohatgi. A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication. In Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS '99), pages 93--100, November 1999.]]
[36]
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Elizabeth Royer, and Clay Shields. A Secure Routing Protocol for Ad hoc Networks. In Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP '02), November 2002.]]
[37]
David L. Tennenhouse, Jonathan M. Smith, W. David Sincoskie, David J. Wetherall, and Gary J. Minden. A Survey of Active Network Research. IEEE Communications Magazine, 35(1):80--86, January 1997.]]
[38]
Hannan Xiao, W.K.G. Seah, A. Lo, and K.C. Chua. A Flexible Quality of Service Model for Mobile Ad-Hoc Networks. In Proceedings of the IEEE 51st Vehicular Technology Conference (VTC Spring 2000), volume 1, pages 445--449, May 2000.]]
[39]
Manel Guerrero Zapata and N. Asokan. Securing Ad Hoc Routing Protocols. In Proceedings of the ACM Workshop on Wireless Security (WiSe), pages 1--10, September 2002.]]

Cited By

View all
  • (2018)Process Calculi for Intrusion Detection System in Mobile Ad-hoc NetworksJournal of Communications10.12720/jcm.13.11.635-647(635-647)Online publication date: 2018
  • (2018)A behavioural theory for intrusion detection system in mobile ad-hoc networksProceedings of the 2nd International Conference on High Performance Compilation, Computing and Communications10.1145/3195612.3195617(51-60)Online publication date: 15-Mar-2018
  • (2014)Trust Management and Modeling Techniques in Wireless CommunicationsSecurity, Privacy, Trust, and Resource Management in Mobile and Wireless Communications10.4018/978-1-4666-4691-9.ch012(278-294)Online publication date: 2014
  • Show More Cited By

Index Terms

  1. Securing quality-of-service route discovery in on-demand routing for ad hoc networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
    October 2004
    124 pages
    ISBN:1581139721
    DOI:10.1145/1029102
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 October 2004

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. QoS routing
    2. SQoS
    3. ad hoc networks
    4. quality-of-service
    5. security
    6. simulations

    Qualifiers

    • Article

    Conference

    CCS04
    Sponsor:

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 20 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)Process Calculi for Intrusion Detection System in Mobile Ad-hoc NetworksJournal of Communications10.12720/jcm.13.11.635-647(635-647)Online publication date: 2018
    • (2018)A behavioural theory for intrusion detection system in mobile ad-hoc networksProceedings of the 2nd International Conference on High Performance Compilation, Computing and Communications10.1145/3195612.3195617(51-60)Online publication date: 15-Mar-2018
    • (2014)Trust Management and Modeling Techniques in Wireless CommunicationsSecurity, Privacy, Trust, and Resource Management in Mobile and Wireless Communications10.4018/978-1-4666-4691-9.ch012(278-294)Online publication date: 2014
    • (2014)An energy-efficient and security aware route selection protocol for wireless sensor networksSecurity and Communication Networks10.1002/sec.9157:11(2015-2038)Online publication date: 1-Nov-2014
    • (2012)Enabling secure and reliable policy-based routing in MANETsMILCOM 2012 - 2012 IEEE Military Communications Conference10.1109/MILCOM.2012.6415657(1-7)Online publication date: Oct-2012
    • (2012)Selfish aware queue scheduler for packet scheduling in MANET2012 International Conference on Recent Trends in Information Technology10.1109/ICRTIT.2012.6206808(343-348)Online publication date: Apr-2012
    • (2011)A review of routing protocols for mobile ad hoc networksWSEAS TRANSACTIONS on COMMUNICATIONS10.5555/2189911.218991310:11(331-340)Online publication date: 1-Nov-2011
    • (2010)Secure QoS Enabled On-Demand Link-State Multipath Routing in MANETSInformation Processing and Management10.1007/978-3-642-12214-9_41(250-257)Online publication date: 2010
    • (2009)QoS Routing Protocols for Mobile Ad Hoc NetworksWireless Ad Hoc Networking10.1201/9781420013825.ch13(343-369)Online publication date: 24-Nov-2009
    • (2008)A survey of secure mobile Ad Hoc routing protocolsIEEE Communications Surveys & Tutorials10.1109/SURV.2008.08040710:4(78-93)Online publication date: 1-Oct-2008
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media