Securing broadcast based ad hoc routing protocols

被引:1
|
作者
Ganzinger, Matthias
Hymas, William J.
Schutt, Thomas
机构
关键词
D O I
10.1109/PERCOMW.2007.104
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security, particularly integrity and confidentiality, is a prerequisite for using mobile ad hoc networks (MANETs) in sensitive or hostile environments. Existing MANET routing protocols, however, are commonly not designed to ensure, that only authorized nodes can join the MANET. The topology of the MANET and potential points of attack are revealed to (unauthorized) listeners if control messages are sent unencrypted. We propose a modification of the optimized link state routing (OLSR) protocol. In a reference implementation we replaced OLSR's broadcast messages with a set of unicast messages. To provide peer access and control in the mobile environment we issued certificates to all participating nodes and used these for mutual authentication. Additionally, we encrypted all OLSR messages using Internet Protocol Security (IPsec). This method adds additional traffic to the network. We discuss the complexity of our approach and estimate network parameters for which the impact can be considered tolerable.
引用
收藏
页码:137 / 141
页数:5
相关论文
共 50 条
  • [1] Securing ad hoc routing protocols
    Kargl, F
    Schlott, S
    Klenk, A
    Geiss, A
    Weber, M
    PROCEEDINGS OF THE 30TH EUROMICRO CONFERENCE, 2004, : 514 - 519
  • [2] Scalable broadcast strategies for ad hoc routing protocols
    Wisitpongphan, Nawapom
    Tonguz, Ozan K.
    INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, 2006, : 187 - +
  • [3] Methods for Securing Routing Protocols in Ad-Hoc Networks
    Costinela-Luminita, Ciobanu
    Magdalena, Ciobanu Nicoleta
    14TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2012), 2012, : 341 - 348
  • [4] An Efficient Broadcast Authentication Scheme for Ad Hoc Routing Protocols
    Ramkumar, Mahalingam
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2231 - 2236
  • [5] The Broadcast Based Ad Hoc Routing Protocol (BCBR) - A novel approach for ad hoc routing
    Gruber, I
    Matthiesen, C
    PROVIDING QUALITY OF SERVICE IN HETEROGENEOUS ENVIRONMENTS, VOLS 5A AND 5B, 2003, 5A-B : 141 - 150
  • [6] A Cumulative Authentication Method for Securing Source Routing Protocols in Ad Hoc Networks
    B.Moussakhani
    S.M.Safavi
    H.Ebrahimzad
    China Communications, 2007, 4 (01) : 40 - 47
  • [7] A Cumulative Authentication Method for Securing Source Routing Protocols in Ad Hoc Networks
    Moussakhani, B.
    Safavi, S. M.
    Ebrahimzad, H.
    2006 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, 2006,
  • [8] A cumulative authentication method for securing source routing protocols in ad hoc networks
    Moussakhani, B.
    Safavi, S. M.
    Ebrahimzad, H.
    CHINA COMMUNICATIONS, 2007, 4 (01) : 40 - 47
  • [9] Ad hoc Routing Protocols Optimization Based on Orchestra
    Zhan, Siyu
    Peng, Yongxiang
    Yang, Yaling
    Li, Jianping
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7, 2010, : 23 - 27
  • [10] On the scalability of ad hoc routing protocols
    Santiváñez, CA
    McDonald, B
    Stavrakakis, I
    Ramanathan, R
    IEEE INFOCOM 2002: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 1688 - 1697