Abstract
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity of the path discovered. The verification processes of route requests and route replies are independently executed while symmetrically implemented at the source and destination nodes, which makes AOSR easy to implement and computationally efficient, compared with prior approaches based on digital signing mechanisms. By binding the MAC address (physical address) with the ID of every node, we propose a reliable neighbor-node authentication scheme to defend against complex attacks, such as wormhole attacks. An interesting property of AOSR is the ”zero” communication overhead caused by the key establishment process, which is due to the exploitation of a Self-Certified Key (SCK) cryptosystem. Analysis and simulation results show that AOSR effectively detects or thwarts a wide range of attacks to ad hoc routing, and is able to maintain high packet-delivery ratios, even when a considerable percentage nodes are compromised.
This work was supported in part by the National Science Foundation under Grant CNS-0435522, by the UCOP CLC under grant SC-05-33 and by the Baskin Chair of Computer Engineering at University of California, Santa Cruz.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
The Network Simulator - NS2, http://www.isi.edu/nsnam/ns/
Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In: Proceedings of IEEE INFOCOM, San Francisco, USA, March 30 - April 3 (2003)
Hu, Y., Perrig, A., Johnson, D.: Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks. In: Proceedings of the 8th ACM International Conference on Mobile Computing and Networking, MobiCom (September 2002)
Perkins, C.E., Royer, E.M.: Ad Hoc On Demand Distance Vector Routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, pp. 90–100 (February 1999)
Petersen, H., Horster, P.: Self-Certified Keys - Concepts and Applications. In: Proceedings of the 3rd Conference of Communications and Multimedia Security, Athens, September 22-23 (1997)
Sanzgiri, K., Dahill, B., Levine, B.N., Royer, E., Shields, C.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of the 10th Conference on Network Protocols, ICNP (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, Z., Garcia-Luna-Aceves, J.J. (2005). Enhancing the Security of On-demand Routing in Ad Hoc Networks. In: Syrotiuk, V.R., Chávez, E. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2005. Lecture Notes in Computer Science, vol 3738. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11561354_15
Download citation
DOI: https://doi.org/10.1007/11561354_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29132-9
Online ISBN: 978-3-540-32086-9
eBook Packages: Computer ScienceComputer Science (R0)