Skip to main content
Erschienen in: Journal of Network and Systems Management 4/2006

01.12.2006

Efficient, Secure, Dynamic Source Routing for Ad-hoc Networks

verfasst von: Michael Weeks, Gulsah Altun

Erschienen in: Journal of Network and Systems Management | Ausgabe 4/2006

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Routing is a must for networks that do not have a fixed point-to-point infrastructure, such as in an ad hoc wireless network that offers unrestricted mobility. A source node in such a network can communicate with a distant destination node after finding a route, relying on the intermediate nodes to transfer the packets. However, some intermediate nodes might act selfishly and drop packets for other nodes in order to save their own battery power.
In this paper, we propose an algorithm to find selfish nodes and deal with them, using a modified Dynamic Source Routing (DSR) protocol, that we call Efficient Secure Dynamic Source Routing (ESDSR). Our results show an increase in the packet delivery ratio in a network containing selfish/unreliable nodes when we compare DSR with our protocol.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat D. B. Johnson, D. A. Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks in Ad Hoc Networking, edited by Charles E. Perkins, Addison-Wesley, 2001, pp. 139–172. D. B. Johnson, D. A. Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks in Ad Hoc Networking, edited by Charles E. Perkins, Addison-Wesley, 2001, pp. 139–172.
2.
Zurück zum Zitat C. E. Perkins and P. Bhagwat, “Higly dynamic destination-sequenced distance vector (DTDV) for mobile computers,” Proc. of the SIGCOMM 1994 Conference on Communications Architectures, Protocols and Applications, August 1994 pp. 234–244. C. E. Perkins and P. Bhagwat, “Higly dynamic destination-sequenced distance vector (DTDV) for mobile computers,” Proc. of the SIGCOMM 1994 Conference on Communications Architectures, Protocols and Applications, August 1994 pp. 234–244.
3.
Zurück zum Zitat C.-C. Chiang, “Routing in clustered multihop, mobile wireless networks with fading channel,” Proc. IEEE SICON’97, April 1997 pp. 197–211. C.-C. Chiang, “Routing in clustered multihop, mobile wireless networks with fading channel,” Proc. IEEE SICON’97, April 1997 pp. 197–211.
4.
Zurück zum Zitat C. E. Perkins and E. M. Royer, Ad hoc On-Demand Distance Vector Routing Ad hoc Networking, Addison-Wesley Publishers, Ed. Charles Perkins, 2000. C. E. Perkins and E. M. Royer, Ad hoc On-Demand Distance Vector Routing Ad hoc Networking, Addison-Wesley Publishers, Ed. Charles Perkins, 2000.
5.
Zurück zum Zitat B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, “An on demand secure routing protocol resilient to byzantine failures,” In ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia, USA, September 28, 2002, pp. 21–30. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, “An on demand secure routing protocol resilient to byzantine failures,” In ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia, USA, September 28, 2002, pp. 21–30.
6.
Zurück zum Zitat C. Karlof and D. Wagner, “Secure routing in sensor networks: Attacks and countermeasures,” Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, Vol. 1, Iss. 2–3, pp. 293–315, September 2003. C. Karlof and D. Wagner, “Secure routing in sensor networks: Attacks and countermeasures,” Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, Vol. 1, Iss. 2–3, pp. 293–315, September 2003.
7.
Zurück zum Zitat L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network Magazine, November/December 1999 pp. 24–30. L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network Magazine, November/December 1999 pp. 24–30.
8.
Zurück zum Zitat B. Dahill, B. N. Levine, E. Royer, and Shields, “A secure routing protocol for ad hoc networks,” 10th International Conference on Networks Protocols (ICND’02), 2002. B. Dahill, B. N. Levine, E. Royer, and Shields, “A secure routing protocol for ad hoc networks,” 10th International Conference on Networks Protocols (ICND’02), 2002.
9.
Zurück zum Zitat Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demand routing protocol for ad hoc networks,” Proceedings of the eighth annual international conference on Mobile computing and networking (MobiCom 2002), Atlanta, Georgia, USA, September 23–28, 2002, pp. 12–23. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demand routing protocol for ad hoc networks,” Proceedings of the eighth annual international conference on Mobile computing and networking (MobiCom 2002), Atlanta, Georgia, USA, September 23–28, 2002, pp. 12–23.
10.
Zurück zum Zitat A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “The TESLA broadcast authentication protocol,” RSA CryptoBytes, Volume 5, Summer 2002. A. Perrig, R. Canetti, J. D. Tygar, and D. Song, “The TESLA broadcast authentication protocol,” RSA CryptoBytes, Volume 5, Summer 2002.
11.
Zurück zum Zitat Y.-C. Hu, A. Perrig, and D. B. Johnson, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,” Ad Hoc Networks, Elsevier, July 2003 pp. 175–192. Y.-C. Hu, A. Perrig, and D. B. Johnson, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,” Ad Hoc Networks, Elsevier, July 2003 pp. 175–192.
12.
Zurück zum Zitat F. Stajano and R. Anderson, “The resurrecting duckling: Security issues for ad hoc wireless networks,” The 7th International Workshop on Security Protocols, LNCS 1796, Springer, 1999. F. Stajano and R. Anderson, “The resurrecting duckling: Security issues for ad hoc wireless networks,” The 7th International Workshop on Security Protocols, LNCS 1796, Springer, 1999.
13.
Zurück zum Zitat P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc networks,” SCS Communication Networks and Distributed Systems (CNDS 2002), January 27–31, 2002. P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc networks,” SCS Communication Networks and Distributed Systems (CNDS 2002), January 27–31, 2002.
14.
Zurück zum Zitat S. Buchegger and J.-Y. Le Boudec, “Cooperative routing in mobile ad-hoc networks,” Mobile Internet Workshop at Informatik, October 2002. S. Buchegger and J.-Y. Le Boudec, “Cooperative routing in mobile ad-hoc networks,” Mobile Internet Workshop at Informatik, October 2002.
15.
Zurück zum Zitat S. Buchegger and J.-Y. Le Boudec, “Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks),” Proceedings of The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, June 2002 pp. 226–236. S. Buchegger and J.-Y. Le Boudec, “Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks),” Proceedings of The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, June 2002 pp. 226–236.
16.
Zurück zum Zitat S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, 2000, pp. 255–265. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, 2000, pp. 255–265.
17.
Zurück zum Zitat S. Zhong, J. Chen, and Y. R. Yang, “Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks,” INFOCOM, 2003. S. Zhong, J. Chen, and Y. R. Yang, “Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks,” INFOCOM, 2003.
18.
Zurück zum Zitat W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Trans. Inform. Theory IT-22, November 1976, pp. 644–654. W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Trans. Inform. Theory IT-22, November 1976, pp. 644–654.
19.
Zurück zum Zitat ns-2 Network Simulator, http://www.isi.edu/nsnam/ns/, University of Southern California, Information Sciences Institute, accessed October 2004. ns-2 Network Simulator, http://www.isi.edu/nsnam/ns/, University of Southern California, Information Sciences Institute, accessed October 2004.
20.
Zurück zum Zitat G. Altun, Security in Wireless Ad Hoc Network Routing Protocols, Georgia State University Master's Thesis, November 7, 2003. G. Altun, Security in Wireless Ad Hoc Network Routing Protocols, Georgia State University Master's Thesis, November 7, 2003.
21.
Zurück zum Zitat V. Miller, “Uses of elliptic curves in cryptography,” Advances in Cryptology -- CRYPTO ‘85, Lecture Notes in Computer Science, Vol. 218, Springer-Verlag, 1986, pp. 417–426. V. Miller, “Uses of elliptic curves in cryptography,” Advances in Cryptology -- CRYPTO ‘85, Lecture Notes in Computer Science, Vol. 218, Springer-Verlag, 1986, pp. 417–426.
Metadaten
Titel
Efficient, Secure, Dynamic Source Routing for Ad-hoc Networks
verfasst von
Michael Weeks
Gulsah Altun
Publikationsdatum
01.12.2006
Erschienen in
Journal of Network and Systems Management / Ausgabe 4/2006
Print ISSN: 1064-7570
Elektronische ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-006-9043-8

Weitere Artikel der Ausgabe 4/2006

Journal of Network and Systems Management 4/2006 Zur Ausgabe

Forthcoming contributions

Forthcoming Contributions

Premium Partner