An end-to-end approach to secure routing in MANETs

SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks. 2010; 3:130–149 Published online 23 June 2009 in Wiley InterScience (www.interscience.wiley.com) DOI: 10.1002/sec.121 An end-to-end approach to secure routing in MANETs Stephen Dabideen 1∗,† , Bradley R. Smith 1 and J. J. Garcia-Luna-Aceves 1,2 Department of Computer Engineering University of California, 1156 High Street, Santa Cruz, CA 95064, U.S.A. Palo Alto Research Center (PARC), 3333 Coyote Hill Road, Palo Alto, CA 94304, U.S.A. Summary Providing secure routing in mobile ad hoc networks (MANETs) is far more difficult than establishing secure routing in wired networks or static wireless networks. Node mobility and the relative scarcity of bandwidth render prior solutions ineffective. Solutions based on securing link or path information do not work well in MANETs because the dynamic nature of links requires extensive use of flooding to establish effective countermeasures. On the other hand, solutions based on hop-by-hop exchanges of distance information are easily compromised. Instead of trying to secure the ordering of nodes, we argue that secure routing in MANETs must be based on the end-to-end verification of physical-path characteristics aided by the exploitation of path diversity to increase the probability of finding secure paths. We apply this approach to the design of the Secure Routing through Diversity and Verification (SRDV) protocol, a secure routing protocol that we show to be as efficient as unsecured on-demand or proactive routing approaches in the absence of attacks. We prove that the countermeasures used in SRDV can defend against a variety of known attacks to routing protocols, including attacks involving collusion, and the fabrication and modification of routing packets. We also show the effectiveness of the end-to-end mechanisms via simulations. Copyright © 2009 John Wiley & Sons, Ltd. KEY WORDS: security; ad-hoc networks; end-to-end Introduction Many security solutions have been proposed for rout- ing protocols in mobile ad hoc networks (MANETs); however, to the best of our knowledge, a complete and efficient solution to secure routing in MANETs has not yet been attained. We argue that this is due to the inter- play between signaling packets and data packets, as well as the dynamic nature of MANETs. On-demand or proactive routing protocols based on the distributed computation of distances to destinations must disseminate signaling packets in which the rout- ing metric to destinations is modified on a hop-by-hop Correspondence to: Stephen Dabideen, SOEGRAD 1156 High Street, Santa Cruz, CA 95064, U.S.A. E-mail: dabideen@soe.ucsc.edu basis, so that nodes order themselves with respect to destinations according to the routing metric (e.g., hop count). This empowers adversaries in a MANET to perform attacks by using false distance information to disrupt the ordering nodes try to establish for different destinations. This is especially problematic when nodes act in collusion with other nodes [1]. Because of the problems in securing distance-based routing protocols, most previous approaches to secure routing in MANETs have focused on securing entire paths from source to destination or have each node along the path secure the link it intends to use (e.g., References [2,3]). However this is not a viable approach for large Copyright © 2009 John Wiley & Sons, Ltd.

[1]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[2]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[3]  Tracy Camp,et al.  Two Standards for Rigorous MANET Routing Protocol Evaluation , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[4]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[5]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[6]  J. J. Garcia-Luna-Aceves,et al.  Securing distance-vector routing protocols , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.

[7]  Jean-Chrysostome Bolot,et al.  End-to-end packet delay and loss behavior in the internet , 1993, SIGCOMM '93.

[8]  Tracy Camp,et al.  Minimal Standards for Rigorous MANET Routing Protocol Evaluation * , 2006 .

[9]  Jean-Chrysotome Bolot End-to-end packet delay and loss behavior in the internet , 1993, SIGCOMM 1993.

[10]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[11]  Sandra L. Murphy,et al.  Digital signature protection of the OSPF routing protocol , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[12]  Parameswaran Ramanathan,et al.  What do packet dispersion techniques measure? , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[13]  kc claffy,et al.  Bandwidth estimation: metrics, measurement techniques, and tools , 2003, IEEE Netw..

[14]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[15]  Dmitri Loguinov,et al.  Packet-pair bandwidth estimation: stochastic analysis of a single congested node , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[16]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[17]  Radia J. Perlman,et al.  Network layer protocols with Byzantine robustness , 1988 .

[18]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[19]  Srinivasan Keshav A control-theoretic approach to flow control , 1991, SIGCOMM 1991.

[20]  Zygmunt J. Haas,et al.  The zone routing protocol (zrp) for ad hoc networks" intemet draft , 2002 .

[21]  Mats Björkman,et al.  A new end-to-end probing and analysis method for estimating bandwidth bottlenecks , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).

[22]  Michalis Faloutsos,et al.  Routing amid Colluding Attackers , 2007, 2007 IEEE International Conference on Network Protocols.