ARMA: a scalable secure routing protocol with privacy protection for mobile ad hoc networks

被引:5
|
作者
Ren, Yonglin [1 ]
Boukerche, Azzedine [1 ]
机构
[1] Univ Ottawa, SITE, Paradise Res Lab, Ottawa, ON, Canada
来源
基金
加拿大自然科学与工程研究理事会;
关键词
mobile security; anonymity; mobile agent; secure routing; mobile ad hoc network; PERFORMANCE EVALUATION;
D O I
10.1002/wcm.737
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapidly growing popularity of mobile ad hoc networks (MANETs), many security concerns have arisen from this type of network. In particular, malicious nodes will jeopardize the security of mobile networks if the issues of secure data exchange are not handled properly. Encryption cannot fully protect the data communicated between nodes, as routing information may expose the identities of the communicating nodes and put their relationships at risk. In this paper, we propose an efficient anonymous routing protocol that uses a mobile agent paradigm for MANETs, which we refer to as ARMA. In our protocol, we take advantage of a trust system to prevent effectively the misbehavior of malicious nodes so that only trustworthy nodes are allowed to participate in communications. Furthermore, we present the Malicious Encryption and Malicious ID attacks, as well as other attacks, and note how our scheme is robust to them. Through the proof of protocol correctness, our protocol is analyzed to show how it offers provable security properties. Finally, we provide its performance evaluation based on simulation experiments implemented in an ns-2 simulator. Compared to the secure distributed route construction protocol (SDAR) protocol, our experimental results demonstrate that our scheme not only achieves the necessary anonymity in wireless and mobile networks, but also provides more security with reasonably little additional overhead. Copyright (C) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:672 / 687
页数:16
相关论文
共 50 条
  • [21] A secure routing protocol for ad hoc networks
    Sanzgiri, K
    Dahill, B
    Levine, BN
    Shields, C
    Belding-Royer, EM
    [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, : 78 - 87
  • [22] SECURE ROUTING FOR MOBILE AD HOC NETWORKS
    Argyroudis, Patroklos G.
    O'Mahony, Donal
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (03): : 2 - 21
  • [23] Secure routing for mobile Ad hoc networks
    Liu, Jing
    Fu, Fei
    Xiao, Junmo
    Lu, Yang
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 314 - +
  • [24] Castor: Scalable Secure Routing for Ad Hoc Networks
    Galuba, Wojciech
    Papadimitratos, Panos
    Poturalski, Marcin
    Aberer, Karl
    Despotovic, Zoran
    Kellerer, Wolfgang
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [25] A scalable neighbor-based routing protocol for mobile ad hoc networks
    Ejmaa, Ali Mohamed E.
    Subramaniam, Shamala
    Zukarnain, Zuriati Ahmad
    Hanapi, Zurina Mohd
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (09):
  • [26] Secure position-based routing protocol for mobile ad hoc networks
    Song, Joo-Han
    Wong, Vincent W. S.
    Leung, Victor C. M.
    [J]. AD HOC NETWORKS, 2007, 5 (01) : 76 - 86
  • [27] SDRP: secure and dynamic routing protocol for mobile ad-hoc networks
    Ghosh, Uttam
    Datta, Raja
    [J]. IET NETWORKS, 2014, 3 (03) : 235 - 243
  • [28] I-SEAD: A secure routing protocol for mobile ad hoc networks
    Lin, Chu-Hsing
    Lai, Wei-Shen
    Huang, Yen-Lin
    Chou, Mei-Chun
    [J]. MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2008, : 102 - +
  • [29] SECURE 2ACK ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS
    Vijaya, K.
    [J]. 2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 752 - 758
  • [30] A new reactive secure routing protocol for mobile ad-hoc networks
    Saha, Soma
    Chaki, Rituparna
    Chaki, Nabendu
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS, 2008, : 103 - +