advertisement

secure routing in ad hoc wireless networks

67 %
33 %
advertisement
Information about secure routing in ad hoc wireless networks
Entertainment

Published on October 7, 2007

Author: Gulkund

Source: authorstream.com

advertisement

Secure Routing in Ad Hoc Wireless Networks:  Secure Routing in Ad Hoc Wireless Networks 11.03.2005 Requirements of a Secure Routing Protocol:  Requirements of a Secure Routing Protocol Detection of malicious nodes Guarantee of correct route discovery Confidentiality of network topology Stability against attacks AODV:  AODV Ad-hoc On-demand Distance Vector Protocol Source node broadcasts RouteRequest Intermediate nodes forward it If node has a route to destination, it initiates RouteReply SAR:  SAR Security-aware Ad hoc Routing protocol Enables different levels of security Level of trust as a metric Each packet is associated with a security level Intermediate nodes are associated with security levels Different keys for different levels of security SAR:  SAR SEAD:  SEAD Secure Efficient Ad hoc Distance vector routing protocol Distance Vector Routing The metric used for routing is hop-count Periodic and/or triggered updates DSDV (Highly Dynamic Destination-Sequenced Distance-Vector Routing) uses sequence numbers DSDV-SQ (DSDV for sequence numbers) Assumes upper bound for the metric used SEAD:  SEAD One-Way Hash Function Used for authentication Generates a one-way hash chain Avoids looping Easily implement with slight modifications ARAN:  ARAN Authenticated Routing for Ad hoc Networks routing protocol Based on cryptographic certificates Defeats all identified attacks on the network layer Issue of certificates: There exists a trusted server Doesn’t specify any specific key distribution algorithm ARAN:  ARAN End-to-end route authentication: Ensures that the correct destination is reached by the packets RouteRequest and RouteReply packets encrypted at each node Security-Aware AODV Protocol:  Security-Aware AODV Protocol RouteRequest packets only sent when data packets arrive at node for transmission Malicious node advertises that it has the shortest path redirecting all packets trough itself (blackhole attack) AODV = Ad-hoc On-demand Distance Vector Protocol Security-Aware AODV Protocol:  Security-Aware AODV Protocol Solutions: Restrict the intermediate nodes from originating RouteReply FurtherRouteRequest AODV = Ad-hoc On-demand Distance Vector Protocol

Add a comment

Related presentations

Related pages

Routing Security in Ad Hoc Wireless Networks

Routing Security in Ad Hoc Wireless Networks 1 ... communication protocol for data delivery between wireless devices. Assuring a secure routing protocol is ...
Read more

SECURE ROUTING IN WIRELESS AD-HOC NETWORKS

WIRELESS NETWORK SECURITY 141 by embedding the route from the source to the destination in the packet header. The path in the data packet header is ...
Read more

Secure Routing in Ad Hoc Wireless Networks | Transport ...

9.12 SECURE ROUTING IN AD HOC WIRELESS NETWORKS. Unlike the traditional wired Internet, where dedicated routers controlled by the Internet service ...
Read more

Secure routing in mobile wireless ad hoc networks

We discuss several well known contemporary protocols aimed at securing routing in mobile wireless ad hoc networks. We analyze each of these protocols ...
Read more

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS ... Ad hoc wireless network does not have ... (Authenticated Routing for Ad hoc Networks) (a) ...
Read more

Securing Ad Hoc Networks - Cornell University

Securing Ad Hoc Networks ... wireless links renders an ad hoc network susceptible to link ... properties of ad hoc networks to achieve secure routing.
Read more

Secure Ad-Hoc Network Routing - sparrow.ece.cmu.edu

The RAP Secure Ad-Hoc Network Routing Protocol Many ... "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols."
Read more

Secure Routing in a Vehicular Ad Hoc Network

Secure Routing in a Vehicular Ad Hoc Network ... geneous wireless networks ... Example of an Infrastructure Supported Ad Hoc Environment A. Secure Routing ...
Read more

Secure Routing for Mobile Ad hoc Networks - Cornell University

Secure Routing for Mobile Ad hoc Networks ... The insecurity of the wireless links, ... proposed here Secure Routing Protocol ...
Read more

Secure Routing in Wireless Ad-Hoc Networks - Springer

Baruch Awerbuch, David Holmer, Cristina Nita Rotaru and Herbert Rubens. An On Demand Secure Routing Protocol Resilient to Byzantine Failures. In ACM ...
Read more