NIS02-4: A Secure Quality of Service Routing Protocol for Wireless Ad Hoc Networks

Due to the high flexibility, mobility and low cost features, wireless ad hoc networks are widely used. A particularly challenging problem is how to feasibly detect and defend the major attacks against routing protocols of such networks that have susceptible links and dynamic topology. Most of the existing secure routing protocols for ad hoc networks either avoid the most challenging internal attacks such as Byzantine behaviors, or have often produced inefficient security mechanisms. In this paper, we develop a new efficient distributed key management scheme and a novel algorithm that can detect the most difficult internal attacks, such as Byzantine attacks. We also present a novel secure quality of service routing (SQSR) protocol, which provides both secure and QoS routing. The simulation results have demonstrated the effectiveness of the proposed routing protocol.

[1]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[2]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[3]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[4]  Hisashi Kobayashi,et al.  Highly secure and efficient routing , 2004, IEEE INFOCOM 2004.

[5]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[6]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[7]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[8]  Robert Tappan Morris,et al.  a high-throughput path metric for multi-hop wireless routing , 2005, Wirel. Networks.

[9]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[10]  Tsutomu Sasao,et al.  An FPGA design of AES encryption circuit with 128-bit keys , 2005, ACM Great Lakes Symposium on VLSI.

[11]  Jim Dowling,et al.  Using feedback in collaborative reinforcement learning to adaptively optimize MANET routing , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[12]  Charles E. Perkins,et al.  Ad Hoc Networking , 2001 .

[13]  Radia J. Perlman,et al.  Network layer protocols with Byzantine robustness , 1988 .

[14]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[15]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[16]  Zygmunt J. Haas,et al.  Securing the Internet routing infrastructure , 2002, IEEE Commun. Mag..

[17]  Ming Yu,et al.  A new secure routing protocol to defend Byzantine attacks for ad hoc networks , 2005, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.

[18]  C. E. Perkins Ad Hoc Networking in the IETF , 2006, 2006 1st IEEE International Workshop on Broadband Convergence Networks.