Secure Routing Protocol for Ad Hoc Networks



Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distinct security requirements. We propose a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Our protocol, ARAN, is based on certificates and successfully defeats all identified attacks.

Ad hoc wireless networks assume no pre-deployed infrastructure is available for routing packets end-to-end in a network, and instead rely on intermediary peers. Securing ad hoc routing presents challenges because each user brings to the network their own mobile unit, without the centralized policy or control of a traditional network. Many ad hoc routing protocols have been proposed previously [9, 12, 13, 14, 15, 3], but none of the proposals have defined security requirements, and all inherently trust all participants. In this paper, we demonstrate exploits that are possible against ad hoc routing protocols, define various security environments, and offer a secure solution with an authenticated routing protocol. We detail the exploits against two protocols that are under consideration by the IETF for standardization: the Ad hoc On-demand Distance Vector routing protocol (AODV) [15] and the Dynamic Source Routing protocol (DSR) [9]. AODV and DSR are efficient in terms of network performance, but they allow attackers to easily advertise falsi- fied route information, to redirect routes, and to launch denialof-service attacks.
Click here for free

download this paper


CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER