Abstract

ON DEMAND ROUTING PROTOCOLS IN MOBILE NETWORK

MADHU MALIK

086-098

Vol: 2, Issue: 2, 2012

Mobile Network assume no pre-deployed infrastructure is available for routing packets end-to-end in a network, and instead rely on intermediary peers. Securing ad hoc routing presents challenges because each user brings to the network their own mobile unit, without the centralized policy or control of a traditional network. Especially, Security flaws of routing protocol may cause severe problems under ad hoc network. In this paper we briefly present the most popular on-demand routing protocol ADOV and potential security problems of AODV. Then, this paper analyzes security requirements for ad hoc routing protocols and proposed solutions such as ARAN, SAODV, SAR and SRP.

Download PDF

    References

  1. Das S. Perkins C.E., Belding-Royer E.M. Ad-hoc on-demand distance vector (aodv) routing. RFC 3561, IETF Network Working Group, 2003.
  2. L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network Magazine, 13(6):24–30, November/December 1999.
  3. S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, pages 255–265, 2000.
  4. K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields and E.M. Royer, “A Secure Routing Protocol for Ad hoc Networks”, Proc. 10th IEEE Int’l. Conf. Network Protocols (ICNP’02), IEEE Press, 2002, pp. 78-87.
  5. J.-P. HuBaux, L. Buttyan, and S. Capkun. The quest for security in mobile ad hoc networks. In Proc. ACM MOBICOM, Oct. 2001.
  6. J. Kong et al. Providing robust and ubiquitous security support for mobile ad-hoc networks. In Proc. IEEE ICNP, pages 251–260, 2001.
  7. S. Yi, P. Naldurg, and R. Kravets. Security-aware ad hoc routing for wireless networks. In Proc. ACM Mobihoc, 2001.
  8. P. Papadimitratos and Z. J. Haas. Secure routing for mobile ad hoc networks. SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan 2002.
  9. M.G. Zapata, and N. Asokan, “Secure Ad hoc On-Demand Distance Vector Routing,” ACM Mobile Computing and Communications Review, vol. 3, no. 6, July 2002, pp. 106-10
  10. Mitchell, J. C., Mitchell, M., Stern, U. : Automated Analysis of Cryptographic Protocols Using Murphi. IEEE Symposium on Security and Privacy. (1997) 141–151
  11. Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory. 29(12) (1983) 198–208
  12. W. Diffie, M.E. Hellman, “New directions in cryptography,” IEEE Transactions in Information Theory, 1976.
  13. Zheng Yan, “Security in Ad Hoc Networks”, Networking Laboratory, Helsinki University of Technology, 2001
  14. S. Yi, P. Naldurg, and R. Kravets. Security-aware ad-hoc routing for wireless networks. Technical Report UIUCDCS-R-2001-2241, University of Illinois at Urbana-Champaign, August 2001.
Back

Disclaimer: Indexing of published papers is subject to the evaluation and acceptance criteria of the respective indexing agencies. While we strive to maintain high academic and editorial standards, International Journal of Research in Science and Technology does not guarantee the indexing of any published paper. Acceptance and inclusion in indexing databases are determined by the quality, originality, and relevance of the paper, and are at the sole discretion of the indexing bodies.