Browse > Article

Secure Data Forwarding based on Source Routing in Mobile Ad Hoc Networks  

Roh, Hyo-Sun (숭실대학교 정보통신전자공학부 통신망보안 연구실)
Jung, Sou-Hwan (숭실대학교 정보통신전자공학부)
Abstract
This paper proposes a secure data forwarding scheme on source routing-based ad-hoc networks. The scheme uses two hash-key chains generated from a trusted third party to generate Message Authentication Codes for data integrity The selected MAC keys are delivered to the ad-hoc node using a pre-shared secret between the trusted third party and a node. The proposed scheme does not require the PKI, or the provisioning of the pre-shared secrets among the ad-hoc nodes.
Keywords
MANET MAC; Source routing; Hash-key chain; Hash;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Corson and J. Macker, 'Mobile Ad hoc Networking (MANET),' RFC2501, IETF, January 1999
2 J. Kim, and G. Tsudik, 'SRDP: securing route discovery in DSR,' MobiQuitous 05, July 2005
3 P. Papadimitratos, and Z. J. Haas, 'Secure Routing for Mobile Ad hoc Networks,' Proc. Communication Networks and Distributed Systems Modeling and Simulation Conf, January 2002
4 S. Marti et al., 'Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,' ACM Mobile Comp. and Net, MOBICOM, 2000
5 N. Kang, I. Park, and Y. Kim, 'Secure and Scalable Routing Protocol for Mobile Ad-hoc Networks,' Proc. MATA 2005, October 2005
6 S. Buchegger, J.-Y. L. Boudec, 'A Robust Reputation System for Mobile Ad-hoc Networks,' EPFL IC, Tech. Rep, July 2003
7 M. Guerrero, 'Secure Ad hoc On- Demand Distance Vector (SAODV) Routing,' IETF Internet Draft, September 2006
8 Y.-C. Hu, A. Perrig, and D. B. Johnson, 'Packet leashes: a defense against wormhole attacks in wireless networks,' INFOCOM 2003 IEEE, vol.3, April 2003
9 A. Perrig, R. Canetti, D. Song, and J. D. Tygar, 'Efficient and Secure Source Authentication for Multicast,' In Network and Distributed System Security Symposium, NDSS'01, February 2001
10 P. Papadimitratos, and Z. J. Haas, 'Secure link state routing for mobile ad hoc networks,' Proc. Applications and the Internet Workshops, January 2003
11 Y-C. Hu, A. Perrig, and D. B. Johnson, 'Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks,' 8th Annual Int'l. Conf. Mobile Compo and Net. MobiCom 2002, September 2002
12 K. Sanzgiri, D. LaFlamme, B. Dahill, B. Levine, C. Shields, and E. Royer, 'Authenticated Routing for Ad Hoc Networks,' IEEE Journal on Selected Areas in Communications, vol. 23, no. 3, March 2005
13 Y.-C. Hu, D. Johnson, and A. Perrig, 'SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks,' Proc. Fourth IEEE Workshop on 20-21, June 2002
14 C. Perkins, E. B. Royer, and S. Das, 'Ad hoc On-Demand Distance Vector (AODV) Routing,' RFC3561, IETF, July 2003
15 D. Johnson, D. Maltz, and Y-C. Hu, 'The dynamic source routing protocol for mobile ad hoc networks (DSR),' IETF Internet Draft, April 2003
16 K. Sanzgiri, 'A Secure Routing Protocol for Ad Hoc Networks,' 10th IEEE Int'l. Conf. Network Protocols (ICNP '02), November 2002