In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location information to make forwarding decisions. However, there are several potential security issues for the development of posi
Strategies for enhancing routing security in protocols for mobile ad hoc networks
โ Scribed by Lakshmi Venkatraman; Dharma P. Agrawal
- Publisher
- Elsevier Science
- Year
- 2003
- Tongue
- English
- Weight
- 221 KB
- Volume
- 63
- Category
- Article
- ISSN
- 0743-7315
No coin nor oath required. For personal study only.
โฆ Synopsis
Mobile ad hoc network (MANET) is a new emerging field with its potential applications in extremely unpredictable and dynamic environments. These characteristics require the networks to have much harder security requirements than the contemporary networks. While current routing protocols do seem to adjust well to dynamically changing conditions, they offer either no security mechanisms at all or have only partial solutions for ensuring the correct routing. It is hard to simultaneously achieve both security and robustness in the routing protocols. In this paper, we analyze various possible threats to the routing protocols and introduce strategies to address the same. On one hand, routing protocol can be disrupted due to attacks from intruder nodes that do not belong to the network. On the other hand, routing is severely affected by the presence of compromised nodes that inflict unpredictable and undetectable Byzantine failure. We have addressed the issue of attacks from intruders by means of authentication techniques that rely on mutual trust between nodes. We also study the behavioral patterns of the nodes and isolate compromised nodes using a distributed approach. The effectiveness of our schemes is illustrated by means of extensive simulations using ns-2 simulator. The routing protocol chosen for the study is AODV. We have observed the performance of the network with and without our secured routing scheme.
๐ SIMILAR VOLUMES
## Abstract Multipath routing can adapt to traffic changes, increase reliability and enhance the Quality of Service support in communication networks. This routing algorithm has been recognized as one of the salient features in Mobile __Ad hoc__ Networks (MANETs). However, existing multipath routin
Wireless ad hoc networks consist of nodes with no central administration and rely on the participating nodes to share network responsibilities. Such networks are more vulnerable to security attacks than conventional wireless networks. We propose two efficient security schemes for these networks that