Search icone
Search and publish your papers

Formal security evaluation of ad hoc routing protocols

Or download with : a doc exchange

About the author

Level
Expert

About the document

Published date
Language
documents in English
Format
pdf
Type
term papers
Pages
3 pages
Level
Expert
Accessed
1 times
Validated by
Committee Oboolo.com
0 Comment
Rate this document
  1. Abstract
  2. Introduction
  3. Objectives of paper
    1. Adaptive threat modeling
    2. Automated security analysis
  4. Ad Hoc routing
    1. Single-phased routing
    2. Two-phased routing
  5. Security issues
  6. Conclusion
  7. References

Research into routing protocol development for mobile ad hoc networks has been a significant undertaking since the late 1990's. Secure routing protocols for mobile ad hoc networks provide the necessary functionality for proper network operation. If the underlying routing protocol cannot be trusted to follow the protocol operations, additional trust layers cannot be obtained. For instance, authentication between nodes is meaningless without a trusted underlying route. Security analysis procedures to formally evaluate these developing protocols have been significantly lagging, resulting in unstructured security analysis approaches and numerous secure ad hoc routing protocols that can easily be broken. Evaluation techniques to analyze security properties in ad hoc routing protocols generally rely on manual, non- exhaustive approaches. Nonexhaustive analysis techniques may conclude a protocol is secure, while in reality the protocol may contain unapparent or subtle flaws.

[...] Toh, review of current routing protocols for ad hoc mobile wireless networks," IEEE Personal Communications, vol no pp. 46-55. Y. C. Hu and A. Perrig, survey of secure wireless ad hoc routing," IEEE Security & Privacy, vol no pp. 28-39. P. G. Argyroudis and D. O'Mahony, "Secure routing for mobile ad hoc networks," IEEE Communications Surveys & Tutorials, vol no pp. 2-21. D. Djenouri, L. Khelladi, and A. N. Badache, survey of security issues in mobile ad hoc and sensor networks," IEEE Communications Surveys & Tutorials, vol no pp. [...]


[...] Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annual International Conference on Mobile Computing and Networking pp. 255-265. P. Michiardi and R. Molva, "CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Proc. Communication and Multimedia Security 2002 Conference (CMS'2002) Secure data forwarding. Once routes are established via secure route discovery, two phased routing protocols continue to be vulnerable to attacks against the data forwarding phase. Malicious insiders, or complex attackers, are legitimate routing entities, since malicious insiders are fully trusted and hold certified cryptographic keys. [...]

Similar documents you may be interested in reading.

Customer Relationship Management and the call centers

 Business & market   |  Management   |  Research papers   |  04/02/2009   |   .doc   |   60 pages

Integrated software system

 Science & technology   |  Computer science   |  Thesis   |  05/28/2009   |   .doc   |   79 pages

Recent documents in computer science category

Net neutrality in United States

 Science & technology   |  Computer science   |  Presentation   |  10/02/2018   |   .doc   |   3 pages

Reconstructing householder vectors from tall-skinny QR

 Science & technology   |  Computer science   |  Presentation   |  04/21/2017   |   .doc   |   4 pages