Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN)

In this paper, we analyze one of the secure mobile ad hoc networks protocols, which is authenticated routing for ad hoc networks (ARAN). Such protocol is classified as a secure reactive routing protocol, which is based on some type of query-reply dialog. That means ARAN does not attempt to continuously maintain the up-to-date topology of the network, but rather when there is a need, it invokes a function to find a route to the destination. Here, we detail the security attacks that the ARAN protocol defends against, criticize how an authenticated selfish node can disturb the network by dropping packets or by not cooperating in the routing functionality and propose a reputation-based scheme called reputed-ARAN to detect and defend against selfish nodes

[1]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[2]  Jean-Pierre Hubaux,et al.  Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .

[3]  Pietro Michiardi,et al.  Security in ad hoc networks , 2003 .

[4]  Boon-Chong Seet,et al.  The Handbook of Ad Hoc Wireless Networks , 2002 .

[5]  Partha Dasgupta,et al.  Trusting routers and relays in ad hoc networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[6]  M. S. Corson,et al.  Architectural considerations for mobile mesh networking , 1996, Proceedings of MILCOM '96 IEEE Military Communications Conference.

[7]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[8]  Pietro Michiardi,et al.  Simulation-based analysis of security exposures in mobile ad hoc networks , 2002 .

[9]  Chris J. Mitchell,et al.  Reputation methods for routing security for mobile ad hoc networks , 2003, SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications.

[10]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[11]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[12]  Silvia Giordano,et al.  Modelling cooperation in mobile ad hoc networks: a formal description of selfishness , 2003 .

[13]  Panagiotis Papadimitratos,et al.  The secure routing protocol (SRP) for ad hoc networks, IETF Internet Draft , 2002 .

[14]  Anthony Ephremides,et al.  Distributed algorithm for efficient and interference-free broadcasting in radio networks , 1988, IEEE INFOCOM '88,Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies. Networks: Evolution or Revolution?.

[15]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[16]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[17]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[18]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[19]  Partha Dasgupta,et al.  On using reputations in ad hoc networks to counter malicious nodes , 2004, Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004..

[20]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[21]  Juan-Carlos Cano,et al.  Investigating performance of power-aware routing protocols for mobile ad-hoc networks , 2002, International Mobility and Wireless Access Workshop.

[22]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[23]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[24]  Marco Conti,et al.  Mobile Ad-hoc Networking - Minitrack Introduction , 2001, HICSS.

[25]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[26]  Mary Baker,et al.  Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.

[27]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[28]  Bruce Schneier,et al.  MODELING SECURITY THREATS , 1999 .

[29]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[30]  S. Chakrabarti,et al.  QoS issues in ad hoc wireless networks , 2001, IEEE Commun. Mag..

[31]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[32]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[33]  Panagiotis Papadimitratos,et al.  Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.

[34]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[35]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[36]  Dharma P. Agrawal,et al.  Mobile Ad hoc Networking , 2002 .

[37]  Allen C. Sun Design and implementation of fisheye routing protocol for mobile ad hoc networks , 2000 .

[38]  André Schiper,et al.  On the accuracy of MANET simulators , 2002, POMC '02.

[39]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[40]  Mukesh Singhal,et al.  A Fair Distributed Solution for Selfish Nodes Problem in Wireless Ad Hoc Networks , 2004, ADHOC-NOW.

[41]  J. Broach,et al.  The dynamic source routing protocol for mobile ad-hoc networks , 1998 .

[42]  R. Dorf,et al.  The handbook of ad hoc wireless networks , 2003 .