Securing Geographical Routing in Mobile Ad-hoc Networks

We present geographical secure path routing, an infrastruc ture free geographic routing protocol, that is resilient to disruptions caused by malicious or faulty no des. Geographic locations of anonymous nodes are authenticated in order to provide location authenticat ion and location privacy simultaneously. Our protocol also authenticates the routing paths taken by indi vidual messages. This provides a basis for geographic security policies. This paper discusses the desig n and attack resistance of the secure geographic routing protocol. The overhead of location authentication is i vestigated under various scenarios through network simulation. Results show that the presence of malic ious nodes increases the routing path length. A data delivery rate of better than 80% is sustained even if 40 % of the nodes are malicious.

[1]  Gregory G. Finn,et al.  Routing and Addressing Problems in Large Metropolitan-Scale Internetworks. ISI Research Report. , 1987 .

[2]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[3]  Ivan Stojmenovic,et al.  Routing with Guaranteed Delivery in Ad Hoc Wireless Networks , 1999, DIALM '99.

[4]  Janne Lundberg Routing Security in Ad Hoc Networks , 2000 .

[5]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[6]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[7]  Christian Bettstetter,et al.  Mobility modeling in wireless networks: categorization, smooth movement, and border effects , 2001, MOCO.

[8]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[9]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[10]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[11]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[12]  Jörg Widmer,et al.  Hierarchical location service for mobile ad-hoc networks , 2004, MOCO.

[13]  Mohan S. Kankanhalli,et al.  Anonymous secure routing in mobile ad-hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[14]  Evangelos Kranakis,et al.  Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) , 2004, ICICS.

[15]  Stefan Schlott,et al.  Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..

[16]  Srdjan Capkun,et al.  Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks , 2004 .

[17]  Bharat K. Bhargava,et al.  AO2P: ad hoc on-demand position-based private routing protocol , 2005, IEEE Transactions on Mobile Computing.

[18]  Young-Jin Kim,et al.  Geographic routing made practical , 2005, NSDI.

[19]  Wade Trappe,et al.  Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[20]  Andreas Heinemann,et al.  Survey on Location Privacy in Pervasive Computing , 2005 .

[21]  Ratul Mahajan,et al.  Sustaining cooperation in multi-hop wireless networks , 2005, NSDI.

[22]  Ness B. Shroff,et al.  Geographic routing in the presence of location errors , 2005, 2nd International Conference on Broadband Networks, 2005..

[23]  Donggang Liu,et al.  Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[24]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[25]  T. Leinmüller,et al.  Greedy Routing in Highway Scenarios : The Impact of Position Faking Nodes , 2006 .

[26]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[27]  Pierangela Samarati,et al.  Location privacy in pervasive computing , 2008 .