Securing the Scalable Source Routing Protocol
نویسندگان
چکیده
The Scalable Source Routing (SSR) protocol combines overlay-like routing in a virtual network structure with source routing in the physical network to a single cross-layer architecture. Thereby, it can provide indirect routing in networks that lack a well-crafted structure. SSR is well suited for mobile ad hoc networks, sensor-actuator networks, and especially for mesh networks. Moreover, SSR directly provides the routing semantics of a structured routing overlay, making it an efficient basis for the scalable implementation of fully decentralized applications. In this paper we analyze SSR with regard to security: We show where SSR is prone to attacks, and we describe protocol modifications that make SSR robust in the presence of malicious nodes. The core idea is to introduce cryptographic certificates that allow nodes to discover forged protocol messages. We evaluate our proposed modifications by means of simulations, and thus demonstrate that they are both effective and efficient.
منابع مشابه
Securing AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملLeveraging a Minimal Trusted Computing Base for Securing On-Demand MANET Routing Protocols
We propose an approach to secure on-demand mobile ad hoc network (MANET) routing protocols by leveraging low-complexity trustworthy MANET modules (TMM). Such TMMs, which perform some trivial hard-wired functions involving simple logical and hash operations, can be realized at low cost. We describe the functionality of such TMMs to offer a sound trusted computing base (TCB) for securing MANETs. ...
متن کاملFrom Securing Navigation Systems to Securing Wireless Communication Through Location-Awareness
Mainstream evaluation approaches in the mobile ad hoc network routing community do not provide an automated or exhaustive security analysis capability. In this paper we offer an automated process to evaluate security properties in the route discovery phase for on-demand source routing protocols. We use the SPIN model checker to exhaustively evaluate protocol abstractions against an attacker att...
متن کاملOn Securing Atomic Operations in Multicast AODV
Multicast is an important communication pattern in Mobile Ad-hoc Network (MANET) that involves the transmission of packets to a group of two or more hosts, and thus can support group-oriented applications. Securing multicast routing in MANET is crucial in order to enable effective and efficient implementations of such applications. However, security techniques typically add more complexity to t...
متن کاملMultipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
In recent years, routing has been the most focused area in ad hoc networks research. On-demand routing in particular, is widely developed in bandwidth constrained mobile wireless ad hoc networks because of its effectiveness and efficiency. Most proposed on-demand routing protocols are built and relied on single route for each data session. Whenever there is a link disconnection on the active ro...
متن کامل