Skip to main content

Enhancing the Security of On-demand Routing in Ad Hoc Networks

  • Conference paper
Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3738))

Included in the following conference series:

Abstract

We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity of the path discovered. The verification processes of route requests and route replies are independently executed while symmetrically implemented at the source and destination nodes, which makes AOSR easy to implement and computationally efficient, compared with prior approaches based on digital signing mechanisms. By binding the MAC address (physical address) with the ID of every node, we propose a reliable neighbor-node authentication scheme to defend against complex attacks, such as wormhole attacks. An interesting property of AOSR is the ”zero” communication overhead caused by the key establishment process, which is due to the exploitation of a Self-Certified Key (SCK) cryptosystem. Analysis and simulation results show that AOSR effectively detects or thwarts a wide range of attacks to ad hoc routing, and is able to maintain high packet-delivery ratios, even when a considerable percentage nodes are compromised.

This work was supported in part by the National Science Foundation under Grant CNS-0435522, by the UCOP CLC under grant SC-05-33 and by the Baskin Chair of Computer Engineering at University of California, Santa Cruz.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The Network Simulator - NS2, http://www.isi.edu/nsnam/ns/

  2. Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In: Proceedings of IEEE INFOCOM, San Francisco, USA, March 30 - April 3 (2003)

    Google Scholar 

  3. Hu, Y., Perrig, A., Johnson, D.: Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks. In: Proceedings of the 8th ACM International Conference on Mobile Computing and Networking, MobiCom (September 2002)

    Google Scholar 

  4. Perkins, C.E., Royer, E.M.: Ad Hoc On Demand Distance Vector Routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, pp. 90–100 (February 1999)

    Google Scholar 

  5. Petersen, H., Horster, P.: Self-Certified Keys - Concepts and Applications. In: Proceedings of the 3rd Conference of Communications and Multimedia Security, Athens, September 22-23 (1997)

    Google Scholar 

  6. Sanzgiri, K., Dahill, B., Levine, B.N., Royer, E., Shields, C.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of the 10th Conference on Network Protocols, ICNP (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, Z., Garcia-Luna-Aceves, J.J. (2005). Enhancing the Security of On-demand Routing in Ad Hoc Networks. In: Syrotiuk, V.R., Chávez, E. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2005. Lecture Notes in Computer Science, vol 3738. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11561354_15

Download citation

  • DOI: https://doi.org/10.1007/11561354_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29132-9

  • Online ISBN: 978-3-540-32086-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics