Analyzing security of Authenticated Routing Protocol (ARAN)

Ad hoc network allow nodes to communicate beyond their direct wireless transmission range by introducing cooperation in mobile computer (nodes). Many proposed routing protocol for ad hoc network operate in an ad hoc fashion, as on demand routing protocol often have low overhead and faster reaction time than other type of routing based on periodic protocol. However variety of attacks targeting routing protocol have been identified. By attacking the routing protocol attacker can absorb network traffic, inject them in the path between source and destination and can thus control network traffic. So many secure routing protocols have been developed that deals with these attacks. This paper analyzes the security aspects of one commonly used secure routing protocol ARAN

[1]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[2]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[3]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[4]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[5]  Yih-Chun Hu,et al.  Wormhole Detection in Wireless Ad Hoc Networks , 2002 .

[6]  Biswanath Mukherjee,et al.  Detecting disruptive routers: a distributed network monitoring approach , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[7]  Stefano Basagni,et al.  Secure pebblenets , 2001, MobiHoc '01.

[8]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[9]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[10]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[11]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[12]  Karl N. Levitt,et al.  Protecting routing infrastructures from denial of service using cooperative intrusion detection , 1998, NSPW '97.