APALLS: A Secure MANET Routing Protocol

In infra-structured networks dedicated routers relay packets between network hosts. In contrast, in mobile ad hoc networks (MANET) nodes are simultaneously network hosts and routers. Due to their reduced dependence on communication infrastructure MANETs have useful applications in scenarios where it may be impractical to set up expensive communication infrastructure, and in scenarios involving failure of communication infrastructure. MANET routing protocols are rules to be followed by every mobile node to cooperatively discover optimal paths and route packets between end-points (source and destination nodes). In this chapter we restrict ourselves to the dynamic source routing (DSR) protocol (Johnson & Maltz, 1996). In DSR paths between end-points are established by flooding route-request (RREQ) packets originating from the source, in response to which route-response (RREP) packets are sent along the reverse path. The original DSR protocol (Johnson & Maltz, 1996) implicitly assumes that all nodes will abide by the rules. The presence of nodes that do not adhere to the rules, either deliberately, or due to malfunctioning, can have a deleterious effect on the MANET subnet. Secure MANET routing protocols strive to improve the reliability of the routing process under the presence of non cooperative nodes.

[1]  Yih-Chun Hu Efficient Security Mechanisms for Routing Protocols , 2003 .

[2]  Mahalingam Ramkumar,et al.  Private logical neighborhoods for wireless ad hoc networks , 2009, Q2SWinet '09.

[3]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[4]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[5]  Mahalingam Ramkumar,et al.  On the Complexity of Probabilistic Key Predistribution Schemes , 2009 .

[6]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[7]  A. Yasinsac,et al.  Identifying flaws in the secure routing protocol , 2003, Conference Proceedings of the 2003 IEEE International Performance, Computing, and Communications Conference, 2003..

[8]  Yih-Chun Hu,et al.  Efficient Security Mechanisms for Routing Protocolsa , 2003, NDSS.

[9]  A. Laouiti,et al.  Optimized link state routing protocol for ad hoc networks , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..

[10]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[11]  Gene Tsudik,et al.  SRDP: securing route discovery in DSR , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[12]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[13]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[14]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[15]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[16]  Srdjan Capkun,et al.  BISS: building secure routing out of an incomplete set of security associations , 2003, WiSe '03.

[17]  M. S. Corson,et al.  A highly adaptive distributed routing algorithm for mobile wireless networks , 1997, Proceedings of INFOCOM '97.

[18]  Yuguang Fang,et al.  AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[19]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[20]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[21]  Mahalingam Ramkumar On the scalability of an efficient “Nonscalable” key distribution scheme , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[22]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[23]  Mahalingam Ramkumar,et al.  Improving the resiliency of Ariadne , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[24]  Mike Burmester,et al.  Tracing Byzantine faults in ad hoc networks , 2003 .

[25]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[26]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[27]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[28]  Yuguang Fang,et al.  An ID-based Framework Achieving Privacy and Non-Repudiation in Vehicular Ad Hoc Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.