A secure method on a routing protocol for ad hoc networks

Ad hoc network is collections of wireless mobile devices with limited broadcast range and resources, and no fixed infrastructure. Routing issue is one of the most basic networking issues in ad hoc network. An adversary can easily palsy the network by attacking the routing protocol. There are some secure routing protocols have been proposed for ad hoc network. In this paper is argued about the flaws in an ad hoc routing protocol that called Ariadne. This paper shows that the security proof for the route discovery algorithm Ariadne is flawed, and moreover, this algorithm is vulnerable to some attacks. For solving the shortages in this protocol is proposed the method in the route discovery algorithm. Proposed method in this paper adds the ability of the malicious node detections to this protocol.

[1]  Levente Buttyán,et al.  Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks , 2006, IEEE Transactions on Mobile Computing.

[2]  Levente Buttyán,et al.  Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks , 2005, ESAS.

[3]  Levente Buttyán,et al.  Towards provable security for ad hoc routing protocols , 2004, SASN '04.

[4]  Yang Lu,et al.  Data Burst Statistics and Performance Analysis of Optical Burst Switching Networks with Self-Similar Traffic , 2007 .

[5]  Mike Burmester,et al.  On the Security of Route Discovery in MANETs , 2009, IEEE Transactions on Mobile Computing.

[6]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[7]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[8]  Wenchao Huang,et al.  DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation , 2009, 2009 International Conference on Computational Science and Engineering.

[9]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[10]  Pla Uni,et al.  Secure Routing for Mobile Ad hoc Networks , 2005 .

[11]  Chu-Hsing Lin,et al.  Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[12]  Rajendra V. Boppana,et al.  Crosscheck mechanism to identify malicious nodes in ad hoc networks , 2009, Secur. Commun. Networks.