Secure Routing in AD HOC and Sensor Networks

Both mobile ad hoc networks and wireless sensor networks are gaining popularity due to the fact that they promise viable solutions to a variety of applications. A Mobile Ad hoc NET-work (MANET) consists of a collection of wireless hosts that are capable of communicating with each other without use of a network infrastructure or any centralized administration. A wireless sensor network (WSN) consists of tiny senor nodes with sensing, computation, and wireless communication capabilities. In sensor networks, hundreds or thousands of nodes with low-power, low-cost, and possibly mobile but more likely at fixed locations, collectively monitor an area. However, both MANETs and WSNs are vulnerable to different attacks due to their fundamental characteristics such as open medium, dynamic topology, absence of central administration, distributed cooperation, and constrained capability. Before mobile ad hoc and sensor networks can be successfully deployed, security issues must be addressed. In this chapter we introduce security attacks on MANETs and WSNs and review the recent approaches of secure network routing protocols in both mobile ad hoc and sensor networks.

[1]  J.-P. Hubaux,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[2]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[3]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[4]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[5]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[6]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[7]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2002, Wirel. Networks.

[8]  Rajendra V. Boppana,et al.  Mitigating malicious control packet floods in ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[9]  Deborah Estrin,et al.  Rumor Routing Algorithm For Sensor Networks , 2002 .

[10]  Deborah Estrin,et al.  Rumor routing algorthim for sensor networks , 2002, WSNA '02.

[11]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[12]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[13]  Rajendra V. Boppana,et al.  An adaptive distance vector routing algorithm for mobile, ad hoc networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[14]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[15]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .