Efficient Security Mechanisms for Routing Protocolsa
نویسندگان
چکیده
As our economy and critical infrastructure increasingly rely on the Internet, securing routing protocols becomes of critical importance. In this paper, we present four new mechanisms as tools for securing distance vector and path vector routing protocols. For securing distance vector protocols, our hash tree chain mechanism forces a router to increase the distance (metric) when forwarding a routing table entry. To provide authentication of a received routing update in bounded time, we present a new mechanism, similar to hash chains, that we call tree-authenticated oneway chains. For cases in which the maximum metric is large, we present skiplists, which provides more efficient initial computation cost and more efficient element verification; this mechanism is based on a new cryptographic mechanism, called MW-chains, which we also present. For securing path vector protocols, our cumulative authentication mechanism authenticates the list of routers on the path in a routing update, preventing removal or reordering of the router addresses in the list; the mechanism uses only a single authenticator in the routing update rather than one per router address. We also present a simple mechanism to securely switch one-way chains, by authenticating the next one-way chain using the previous one. These mechanisms are all based on efficient symmetric cryptographic techniques and can be used as building blocks for securing routing protocols.
منابع مشابه
Secure Energy Efficient Routing in Wireless Sensor Network-A Survey on Existing Techniques
Wireless Sensor Network are special kind of Ad-hoc networks. There are number of application for wireless sensor networks like military, healthcare and civil areas and security is important for many of them. However WSN suffers from many constraints like low computation capability, small memory, limited energy resources, lack of infrastructure which impose security challenge. Traditional securi...
متن کاملSecurity Enhancement over Ad-hoc Aodv Routing Protocol
For most existing routing protocols of mobile ad hoc network (MANET), more efficient security mechanisms against the attacks from malicious, compromised and selfish nodes are highly demanded. This paper proposes a series of security mechanisms for the Ad-hoc On-demand Distance Vector (AODV) Routing protocol. Three techniques, including digital signature, one-way hash function and double one-way...
متن کاملRouting Security in Open/Dynamic Mobile Ad Hoc Networks
Current technologies and security advances have made networked systems and applications very popular and widely used. The pervasive and practical aspects of wireless Mobile Ad Hoc Networks (MANET) made them very popular as well. This created the need for securing MANETs to provide users with authentic communications, secure and robust information exchange, and efficient security mechanisms. How...
متن کاملA Secure Hierarchical Protocol for Wireless Sensor Networks
The literature for considering routing protocols in wireless sensor networks (WSNs) is very broad. However, security of these routing protocols has fallen beyond the scope so far. Routing is a fundamental functionality in wireless networks, thus hostile interferences aiming to disrupt and degrade the routing service have a serious impact on the overall operation of the entire network. Gathering...
متن کاملEstudo de mecanismos de segurança para proteção do roteamento em redes de sensores sem fio
Wireless Sensor Networks (WSN) are more subject to enemy action than conventional networks due to their hardware and energy constraints and due to hostile environment in which they can be inserted. This scenario is too favorable to denial of service attacks, especially in routing function, one critical function in any network. This work is focused in routing protecting in WSN. It presents a stu...
متن کامل