
10 Asad A. Pirzada et al.
5 Conclusion
In this paper we have presented a scheme for securing the Dynamic Source Rout-
ing protocol used in mobile ad-hoc wireless networks. The secure DSR protocol
provides requisite measures for protection of route discovery and transfer of data.
These measures can be exercised independently without a central trust authority
with nodes negotiating session keys independently. Nodes are, however, required
to register themselves once with a Certification Authority, prior to joining a net-
work. The scheme is based upon point-to-point and end-to-end encryption using
symmetric key-based mechanisms. Nodes desiring secure communication, exe-
cute any standard authentication and key exchange protocol to acquire session
keys. These keys are subsequently used in point-to-point encryption for route
discovery and end-to-end encryption for data packets. Malicious nodes trying to
launch passive or active attacks against the network are thwarted through ef-
ficient key verification mechanisms and a multi-layered enciphering scheme. To
highlight its viability we have discussed its resistance to a number of attacks
specific to ad-hoc networks.
References
1. Corson, S., Macker, J.: Mobile Ad hoc Networking (MANET): Routing Protocol
Performance Issues and Evaluation Considerations. IETF RFC 2501 (1999)
2. Royer, E.M., Toh, C.-K.: A Review of Current Routing Protocols for Ad-Hoc
Mobile Wireless Networks. IEEE Personal Communications Magazine, Vol. 16(2)
(1999) 46–55
3. Pirzada, A.A., McDonald, C.: Establishing Trust In Pure Ad-hoc Networks. Proc.
of 27th Australasian Computer Science Conference (ACSC04) Vol. 26(1) (2004)
47–54
4. Hu, Y-C., Perrig, A., Johnson, D.B.: Ariadne - A Secure On-Demand Routing
Protocol for Ad Hoc Networks. Proc. of MOBICOM (2002) 12–23
5. Dahill, B., Levine, B.N., Royer, E., Shields, C.: ARAN - A Secure Routing Protocol
for Ad Hoc Networks. Proc. of ICNP (2002) 78–87
6. Pirzada, A.A., McDonald, C.: A Review of Secure Routing Protocols for Ad hoc
Mobile Wireless Networks. Proc. of 7th International Symposium on DSP for Com-
munication Systems (DSPCS03) and 2nd Workshop on the Internet, Telecommu-
nications and Signal Processing (WITSP03) (2003) 118–123
7. Perrig, R., Canetti, D., Tygar, Song, D.: The TESLA Broadcast Authentication
Protocol. RSA CryptoBytes (2002) 2–13
8. Johnson, D.B., Maltz, D.A., Hu, Y.: The Dynamic Source Routing Protocol for
Mobile Ad hoc Networks (DSR). IETF MANET, Internet Draft (2003)
9. Zhou, L, Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network Magazine
Vol. 13(6) (1999)
10. Pirzada, A.A., McDonald, C.: Kerberos Assisted Authentication in Mobile Ad-hoc
Networks. Proc. of 27th Australasian Computer Science Conference (ACSC04)
Vol. 26(1) (2004) 41–46
11. Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed
sensor network security. Technical Report #00-010, NAI Labs (2000)
33