SECURE AD-HOC ROUTING THROUGH A-CODES

Giovanni Schmid, Francesco Rossi

Abstract

Wireless ad-hoc networks are very attractive in several application domains, but the very nature of these networks and their cost objectives pose big security challenges, perhaps making them the most difficult networking environments to secure. A particular challenging issue is that of secure routing. In this work we propose to get secure routing for such networks through a special coding technique at the physical layer of radio communication channels. This approach has the main advantage of being applicable to any routing protocol, without requiring modifications to the protocol itself, but with a suitable key management. We illustrate it for the concrete case of AODV, the standard routing protocol for Low-data-Rate Wireless Personal Area Networks (LR-WPANs). The resulting analysis seems to indicate that such approach is very promising for LR-WPANs, both in term of performance and energy efficiency.

References

  1. Akbani, R., Korkmaz, T., and Raju, G. (2008). HEAP: A packet authentication scheme for mobile ad-hoc networks. Ad Hoc Networks, 6(7).
  2. Cagalj, M., Hubaux, J., Capkun, S., Rengaswamy, R., Tsigkogiannis, I., and Srivastava, M. (2006). Integrity (i) codes: Message integrity protection and authentication over insecure channels. In Proceedings of the 2006 IEEE Symphosium on Security and Privacy. IEEE.
  3. Hu, Y., Johnson, D., and Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1).
  4. Hu, Y. and Perrig, A. (2004). A survey of secure wireless ad hoc routing. Security & Privacy, 2(3).
  5. Hu, Y., Perrig, A., and Johnson, D. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1-2).
  6. IEEE (2006). Std IEEE 802.15.4 - Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs).
  7. Karlof, C. and Wagner, D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 1(1-2).
  8. Menezes, A., van Oorschot, P., and Vanstone, S. (1996). Hanbook of Applied Cryptography. CRC Press.
  9. Ning, P. and Sun, K. (2003). How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. In Information Assurance Workshop 2003. IEEE.
  10. Papadimitratos, P. and Hass, Z. (2003). Secure routing for mobile ad hoc networks. Mobile Computing and Communications Review, 7(1).
  11. Perkins, C., Belding-Royer, E., and Das, S. (2003). RFC 3561 - Ad Hoc On Demand Distance Vector (AODV) Routing. IETF.
  12. Perrig, A., Canetti, R., Tygar, D., and Song, D. (2000). Efficient authentication and signing of multicast streams over lossy channels. In Proceedings of the IEEE Symposium on Research in Security and Privacy. IEEE.
  13. Perrig, A., Szewcyzk, R., Tygar, J., Wen, V., and Culler, D. (2002). SPINS: security protocols for sensor networks. Wireless Networks, 8(5).
  14. Ramachandran, P. and Yasinsac, A. (2001). Limitations of on demand secure routing protocols. In Workshop on Information Assurance. IEEE.
  15. Sanzgiri, K., Dahill, B., Levine, B., Shields, C., and Belding-Royer, E. (2002). A secure routing protocol for ad hoc networks. In Proceedings of the 10th IEEE International Conference on Network Protocols. IEEE.
  16. Schmid, G. and Rossi, F. (2010). A-code: A new crypto primitive for securing wireless sensor networks. In Proceedings of the First International Workshop on Trust management in P2P Systems. Springer.
  17. Zapata, G. and Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security. ACM.
  18. Zhao, M., Walker, J., Hu, Y., Perrig, A., and Trappe, W. (2008). SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks. In Proceedings of ASIACSS 7808. ACM.
  19. Zhu, S., Xu, S., Setia, S., and Jajodia, S. (2003). LHAP: a light-weight hop-by-hop authentication protocol for ad-hoc networks. In Proceedings of the 23rd ICDCS Workshop. IEEE.
Download


Paper Citation


in Harvard Style

Schmid G. and Rossi F. (2011). SECURE AD-HOC ROUTING THROUGH A-CODES . In Proceedings of the 1st International Conference on Pervasive and Embedded Computing and Communication Systems - Volume 1: PECCS, ISBN 978-989-8425-48-5, pages 151-156. DOI: 10.5220/0003313701510156


in Bibtex Style

@conference{peccs11,
author={Giovanni Schmid and Francesco Rossi},
title={SECURE AD-HOC ROUTING THROUGH A-CODES},
booktitle={Proceedings of the 1st International Conference on Pervasive and Embedded Computing and Communication Systems - Volume 1: PECCS,},
year={2011},
pages={151-156},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003313701510156},
isbn={978-989-8425-48-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Pervasive and Embedded Computing and Communication Systems - Volume 1: PECCS,
TI - SECURE AD-HOC ROUTING THROUGH A-CODES
SN - 978-989-8425-48-5
AU - Schmid G.
AU - Rossi F.
PY - 2011
SP - 151
EP - 156
DO - 10.5220/0003313701510156