Browse > Article

Secure Routing with Time-Space Cryptography for Mobile Ad-Hoc Networks  

Joe, In-Whee (한양대학교 정보통신학부)
Abstract
This paper describes the design and performance of a secure routing protocol with time-space cryptography for mobile ad-hoc networks. The proposed time-space scheme works in the time domain for key distribution between source and destination as well as in the space domain for intrusion detection along the route between them. For data authentication, it relies on the symmetric key cryptography due to high efficiency and a secret key is distributed using a time difference from the source to the destination. Also, a one-way hash chain is formed on a hop-by-hop basis to prevent a compromised node or an intruder from manipulating the routing information. In order to evaluate the performance of our routing protocol, we compare it with the existing AODV protocol by simulation under the same conditions. The proposed protocol has been validated using the ns-2 network simulator with wireless and mobility extensions.
Keywords
Secure Routing; Time-Space Cryptography; Mobile Ad-Hoc Networks; Hash Chain;
Citations & Related Records
연도 인용수 순위
  • Reference
1 권혜연,신재욱,이병복,최지혁,남상우,임선배, '이동 Ad hoc 네트워크 기술 동향', 전자통신동향분석, 제18권 제2호, 2003
2 Y. Hu, D.B. Johnson, and A. Perrig, 'SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks', Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), pp. 3-13, IEEE Calicoon, NY, June 2002
3 D. Eastlake and P. Jones, 'US Secure Hash Algorithm 1 (SHA1)', IETF RFC 3174, September 2001
4 C.E. Perkins, E.M. Belding-Royer, and S. Das. 'Ad Hoc On Demand Distance Vector (AODV) Routing', IETF RFC 3561, July 2003
5 M.G. Zapata. 'Secure Ad hoc On-Demand Distance Vector (SAODV) Routing', IETF Internet Draft, draft-guerrero-manet-saodv-00.txt, August 2001
6 P. Cheng and R. Glenn, 'Test Cases for HMAC-MD5 and MAC-SHA-1', IETF RFC 2202, September 1997
7 L. Zhou and Z.J. Haas. 'Securing Ad Hoc Networks', IEEE Network Magazine, November 1999
8 D.B. Johnson, D.A. Maltz, Y. Hu, and J.G. Jetcheva, 'The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks', IETF Internet Draft, draft-ietf-manet-dsr-07.txt, Work in progress, February 2002
9 M.G. Zapata and N. Asokan, 'Securing ad hoc Routing Protocols', Wise'02, Atlanta, Georgia, USA, September 28, 2002