Preventing replay attacks for secure routing in ad hoc networks

被引:0
|
作者
Zhen, J [1 ]
Srinivas, S [1 ]
机构
[1] Dalhousie Univ, Halifax, NS B3H 1W5, Canada
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The design of secure routing techniques is a crucial and challenging requirement in mobile ad hoc networking. This is due to the fact that the highly dynamic nature of the ad hoc nodes, their limited transmission range, and their reliance on an implicit trust model to route packets make the routing protocols inherently susceptible to attacks. We propose a solution to prevent two important types of replay attacks on the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. Our technique is based on strengthening the neighbor authentication mechanism by a simple extension to the AODV protocol. Analysis of the technique indicates that it achieves security with little overhead.
引用
收藏
页码:140 / 150
页数:11
相关论文
共 50 条
  • [21] A secure routing protocol for mobile Ad hoc networks
    Li, Zhitang
    Shi, Shudong
    [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 153 - +
  • [22] Advanced Secure Routing in Ad hoc mobile networks
    Padmadas, M.
    Krishnan, N.
    Sasidharan, Sithara
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 821 - 824
  • [23] GLS with secure routing in ad-hoc networks
    Sumathy, V
    Narayanasmy, P
    Baskaran, K
    Purusothaman, T
    [J]. IEEE TENCON 2003: CONFERENCE ON CONVERGENT TECHNOLOGIES FOR THE ASIA-PACIFIC REGION, VOLS 1-4, 2003, : 1072 - 1076
  • [24] Replay attacks in mobile wireless ad hoc networks: Protecting the OLSR protocol
    Winjum, E
    Hegland, AM
    Kure, O
    Spilling, P
    [J]. NETWORKING - ICN 2005, PT 2, 2005, 3421 : 471 - 479
  • [25] A Secure Dynamic Source Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks
    Mohanapriya, M.
    Krishnamurthi, Ilango
    [J]. SENSOR LETTERS, 2012, 10 (08) : 1751 - 1758
  • [26] Survey of Routing Attacks and Countermeasures in Mobile Ad Hoc Networks
    Abdelaziz, Amara Korba
    Nafaa, Mehdi
    Salim, Ghanemi
    [J]. UKSIM-AMSS 15TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM 2013), 2013, : 693 - 698
  • [27] Security model for routing attacks in mobile ad hoc networks
    Alampalayam, SP
    Kumar, A
    [J]. 2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2122 - 2126
  • [28] SECURE ROUTING PROTOCOL DESIGN FOR UAV AD HOC NETWORKS
    Maxa, Jean Aime
    Ben Mahmoud, Mohamed Slim
    Larrieu, Nicolas
    [J]. 2015 IEEE/AIAA 34TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2015,
  • [29] Survey on Secure Routing in Mobile Ad-hoc Networks
    Kannammal, A.
    Roy, S. Sujith
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN HUMAN MACHINE INTERACTION (HMI), 2016, : 154 - 160
  • [30] Secure Implementation Of Routing Protocols For Wireless Ad Hoc Networks
    Amutha, S.
    Balasubramanian, Kannan
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 960 - 965