Exploring Routing Security in Ad Hoc Networks

Ardavan ZAMANPOUR, Somaieh YASSARI, Abdol Hamid ZAHEDI
1.653 473


Ad Hoc networks are the ones don’t use any network axillary element for routing, but participated nodes in these networks have task of network routing. Security in Ad hoc networks has a particular condition, because besides problems such as existed problems in wire networks, we face with problems such as simple hearing and information changing in transferring, possibility of people impersonation or damage routing operations, non-possibility of using coded key distribution infrastructures and so on. One of the most important security cases in ad hoc networks is providing a secured routing algorithm in these networks. It has been tried in recent years to provide a secured routing algorithm in ad hoc networks, amongst, there are protocols such as ARAN, SAODA, SRP, Ariadne, SEAD, etc. but each one has its particular problems. Moreover, lack of an acceptable algorithm both according to security and network efficiency is felt.



Security, ad hoc network, routing

Full Text:



Bridget Dahill et al, “A Secure Routing Protocol for Ad Hoc Networks,” MobiCom 2002, Atlanta, Georgia, USA, September 23-28, 2002.

Yih-Chun Hu and Adrian Perrig, “A Survey of Secure Wireless Ad Hoc Routing,” IEEE Security and Privacy 2004, Editorial Calendar, Vol. 2, No. 3, PP. 94-105, May/June 2004. Nicola Milanovic et al, “Routing and Security in Mobile Ad Hoc Networks”, IEEE Computer, Vol. 37, No. 2, PP. 61-65, 2004.

Yih-Chun Hu, et al, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,” Proceedings of the 2003 ACM workshop on Wireless security, San Diego, USA, PP. 30-40, 2003.

Po-Wah Yau and Chris J. Mitchell, “Reputation Methods for Routing Security for Mobile Ad Hoc Networks,” Proceedings of SympoTIC '03 Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, PP. 130-137, October 2003.

Sergio Marti et al, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proceedings of the 6th annual international conference on Mobile computing and networking, Boston, USA, PP. 255-265, 2000.

Souheila Bouman, Jalel Ben-Othman, “Data Security in Ad hoc Networks Using MultiPath Routing,” accepted in The 2004 International Workshop on Mobile Ad Hoc Networks and Interoperability Issues (MANETII'04), Las Vegas, Nevada, USA, June 2004.

Stephen Carter and Alec Yasinsac, “Secure Position Aided Ad hoc Routing,” Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), Nov 3-4, 2002.

B Strulo, J Farr and A Smith, “Securing mobile ad hoc networks — a motivational approach,” BT Technology Journal, Vol. 21, No. 3, PP. 81-90, 2003.

Panagiotis Papadimitratos and Zygmunt J. Haas, “Secure Routing for Mobile Ad hoc Networks,” SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31, 2002.

Stefano Basagni et al, Mobile Ad-hoc Networking, IEEE press, John Wiley and Sons publication, PP. 329-354, 2004

N. Asokan and P. Ginzboorg, “Key Agreement in Ad hoc Networks,” Computer Communications, vol. 23(17), pp. 1627-1637, 2000.