Routing Protocols Security in Ah Hoc Networks

Mobile Ad hoc networks, also known as MANETs, are a new and useful innovation in the field of mobile wireless communication. Due to the various applications that have been and can be developed under this technology including ocean and wildlife monitoring, manufacturing machinery performance monitoring, building safety and earthquake monitoring, and many military applications, MANETs have been attracting many researchers. Unlike other types of networks, MANETs are usually deployed without a centralized control unit; the devices participating in a MANET rely on other units to route information to their destinations. This, along with the fact that MANET nodes are often constrained in power, makes MANETs vulnerable to various malicious attacks and applying the routing techniques that work with wired networks is infeasible here. In this research project we will analyze the routing protocols and security attacks in such networks. We will survey MANET routing protocols and security schema. Finally, we will propose new features to secure Ad hoc on demand Distance Vector routing protocol (AODV) against Denial of Service (DOS) attacks, and to detect malicious nodes, including black and gray holes attacks.

[1]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[2]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[3]  Robin Kravets,et al.  Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.

[4]  Dharma P. Agrawal,et al.  Strategies for enhancing routing security in protocols for mobile ad hoc networks , 2003, J. Parallel Distributed Comput..

[5]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[6]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[7]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[8]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[9]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.