A new secure routing protocol to defend Byzantine attacks for ad hoc networks

被引:0
|
作者
Yu, M [1 ]
Kulkarni, S [1 ]
Lau, P [1 ]
机构
[1] SUNY Binghamton, Dept Elect & Comp Engn, Binghamton, NY 13902 USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
To secure ad hoc networks, a particularly challenging problem is how to feasibly detect and defend the internal attacks against the routing protocols, such as Byzantine behaviors. In this paper, we develop: (1) an efficient distributed key management scheme that a source node can authenticate its neighbors and establish a session key on-demand; (2) a novel detection algorithm that can detect the internal attacks, such as Byzantine attacks, by using both message and route redundancy; (3) a new secure routing protocol (SRP), behavior-based secure routing (BBSR), in which a node selects its best route based on its accumulated trust on the nodes along the candidate routes, (4) a cost function that directly measures the cost of the increased trustworthiness and its impact on network performance. The simulation results have demonstrated the effectiveness of the proposed key management scheme, attack detection algorithm, and routing protocol.
引用
收藏
页码:1126 / 1131
页数:6
相关论文
共 50 条
  • [1] A secure routing protocol for ad hoc networks
    Sanzgiri, K
    Dahill, B
    Levine, BN
    Shields, C
    Belding-Royer, EM
    [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, : 78 - 87
  • [2] Secure Multicast Routing Protocol against Internal Attacks in Mobile Ad Hoc Networks
    Pushpa, A. Menaka
    Kathiravan, K.
    [J]. 2013 7TH IEEE GCC CONFERENCE AND EXHIBITION (GCC), 2013, : 245 - 250
  • [3] ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
    Awerbuch, Baruch
    Curtmola, Reza
    Holmer, David
    Nita-Rotaru, Cristina
    Rubens, Herbert
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 10 (04)
  • [4] A secure routing protocol for mobile ad hoc networks
    [J]. Du, D. (orchid_ee@sina.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [5] A secure routing protocol for mobile Ad hoc networks
    Li, Zhitang
    Shi, Shudong
    [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 153 - +
  • [6] Preventing replay attacks for secure routing in ad hoc networks
    Zhen, J
    Srinivas, S
    [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2003, 2865 : 140 - 150
  • [7] A new reactive secure routing protocol for mobile ad-hoc networks
    Saha, Soma
    Chaki, Rituparna
    Chaki, Nabendu
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS, 2008, : 103 - +
  • [8] New enhancement scheme for secure routing protocol in mobile ad hoc networks
    Yang, RJ
    Xia, Q
    Pan, QH
    Wang, WN
    Li, ML
    [J]. FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 685 - 689
  • [9] SECURE ROUTING PROTOCOL DESIGN FOR UAV AD HOC NETWORKS
    Maxa, Jean Aime
    Ben Mahmoud, Mohamed Slim
    Larrieu, Nicolas
    [J]. 2015 IEEE/AIAA 34TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2015,
  • [10] Formal Analysis of Secure Routing Protocol for Ad Hoc Networks
    Niu, Qiuna
    [J]. 2009 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2009), 2009, : 171 - 174