IJCNIS Vol. 4, No. 12, 8 Nov. 2012
Cover page and Table of Contents: PDF (size: 249KB)
Full Text (PDF, 249KB), PP.65-72
Views: 0 Downloads: 0
Routing protocols, ad hoc networks, Authentication, Non repudiation, Confidentiality, Authorization, ARAN
Many proposed routing protocols for ad hoc networks operate in an ad hoc fashion, as on demand routing protocols often have low overhead and faster reaction time than other types of routing based on periodic protocols. Dynamic nature of ad-hoc networks leads to challenges in securing the network. Due to the vulnerable nature of ad-hoc networks there are many security threats. One of the solutions to the problem is ARAN – Authenticated routing protocol which is a secure protocol and provides Integrity, Availability, Confidentiality, Authenticity, Non repudiation, Authorization & Anonymity. But an authenticated selfish node can interfere this protocol and disturb the network by dropping packets. However varieties of attacks targeting routing protocols have been identified. By attacking, the routing protocol attacker can absorb network traffic, inject them in the path between source and destination and thus control 0network traffic. Therefore many secure routing protocols have been developed that deal with these attacks. This paper analyzes the security aspects of one commonly used secure routing protocol ARAN.
G.Sunayana, Sukrutharaj.M, Lalitha rani.N, M.B.Kamakshi, "Security Mechanisms to Decrease Vulnerability of Ad-hoc Routing Protocols", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.12, pp.65-72, 2012. DOI:10.5815/ijcnis.2012.12.07
[1]Mobile Ad -hoc Networks (MANET). URL: http://www.ietf.org/html.charters/manet-charter.html.
[2]D. Johnson, D. Maltz, Y.-C. Hu, and J. Jetcheva. The dynamic source routing protocol for mobile ad hoc networks. IEEE Internet Draft, March 2001. draft-ietf-manet-dsr-05.txt (work in progress).
[3]S. Murthy and J.J. Garcia-Lunca-Aceves. An efficient routing protocol for wireless networks. ACM Mobile Networks and Applications Journal, pages 183–197, Oct. 1996.
[4]V. Park and M. Corson. A highly adaptive distributed routing algorithm for mobile wireless networks. In Proc. INFOCOMM, April 1997.
[5]C. E. Perkins and P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. Computer Commu- nications Review, pages 234–244, Oct. 1994.
[6]C. E. Perkins and E. M. Royer. Ad hoc on-demand distance vector rout- ing. In IEEE Workshop on Mobile Computing Systems and Applications, pages 90–100, Feb. 1999.
[7]C. R. Davis. IPSec: Securing VPNs. McGraw-Hill, New York, 2000.
[8]L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24–30, 1999.
[9]J.P. HuBaux, L. Buttyan, and S. Capkun. The quest for security in mobile ad hoc networks. In Proc. ACM MOBICOM, Oct. 2001.
[10]J. Kong et al. Providing robust and ubiquitous security support for mobile ad-hoc networks. In Proc. IEEE ICNP, pages 251–260, 2001.
[11]S. Yi, P. Naldurg, and R. Kravets. Security-aware ad hoc routing for wireless networks. In Proc. ACM Mobihoc, 2001.
[12]F. Wang, B. Vetter, and S. Wu. Secure routing protocols: Theory and practice. Technical report, North Carolina State University, May 1997.
[13]W. Arbaugh, N.Shankar, and Y.C. Wan. Your 802.11 wireless network has no clothes. Technical report, Dept. of Computer Science, University of Maryland, March 2001.
[14]N. Borisov, I. Goldberg, and D.Wagner. Intercepting mobile communications: The insecurity of 802.11.http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html.
[15]A. Stubblefield, J. Ioannidis, and A. D. Rubin. Using the fluhrer, mantin, and shamir attack to break wep. Technical Report TD-4ZCPZZ, AT&T Labs, August 2001.
[16]C. E. Perkins and P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers. Computer Communications Review, pages 234–244, Oct. 1994.
[17]E. M. Royer and C.-K. Toh, "A Review of Current Routing Protocols for Ad hoc Mobile Wireless Networks," IEEE Pers. Commun., vol. 2, no. 6, Apr. 1999, pp. 46–55.
[18]Dirk Balfanz, D. K. Smetters, Paul Stewart, and H. Chi Wong. Talking To Strangers: Authentication in Ad-Hoc Wireless Networks. In Symposium on Network and Distributed Systems Security (NDSS 2002), February 2002.
[19]Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), pages 12–23, September 2002.
[20]Jean-Pierre Hubaux, Levente Butty´an, and Srdjan C¡ apkun. The Quest for Security in Mobile Ad Hoc Networks. In Proceedings of the Third ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), Long Beach, CA, USA, October 2001
[21]Stefano Basagni, Kris Herrin, Emilia Rosti, and Danilo Bruschi. Secure Pebblenets. In ACM International Symposium on Mobile Ad Hoc Networking andComputing (MobiHoc 2001), pages 156–163, Long Beach, California, USA, October 2001.
[22]Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. In Proceedings of the Sixth Annual InternationalConference on Mobile Computing and Networking (MobiCom 2000), pages 255–265, Boston MA, USA, August 2000.
[23]Seung Yi, Prasad Naldurg, and Robin Kravets. Security-Aware Ad- Hoc Routing for Wireless Networks. Technical Report UIUCDCS-R- 2001-2241, Department of Computer Science, University of Illinois at Urbana-Champaign, August 2001.
[24]Yih-Chun Hu, David B. Johnson, and Adrian Perrig. Secure Efficient Distance Vector Routing in MobileWireless Ad Hoc Networks. In Fourth IEEEWorkshop on Mobile Computing Systems and Applications (WMCSA '02), June 2002.
[25]Steven Cheung and Karl Levitt. Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection. In The 1997 New SecurityParadigms Workshop, September 1998.
[26]Kirk A. Bradley, Steven Cheung, Nick Puetza, Biswanath Mukherjee, and Ronald A. Olsson. Detecting Disruptive Routers: A Distributed Network Monitoring Approach. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 115– 124, May 1998.