10.1.1.123.2894 - Network Security Scott Huang, David...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Network Security Scott Huang, David MacCallum, and Ding Zhu Du(Eds.) pp. – - – c circlecopyrt 2005 Springer Routing Security in Ad Hoc Wireless Networks 1 Mohammad O. Pervaiz, Mihaela Cardei, and Jie Wu Department of Computer Science and Engineering Florida Atlantic University, Boca Raton, FL 33431 E-mail: { mpervaiz@, mihaela@cse., jie@cse. } fau.edu Contents 1 Introduction to Ad Hoc Wireless Networks 2 2 Overview of Routing Protocols in Ad Hoc Wireless Networks 4 2.1 Proactive Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . 5 2.2 Reactive Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . 6 2.3 Hybrid Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . 8 2.4 Broadcasting in Ah Hoc Wireless Networks . . . . . . . . . . . . . . 9 3 Security Services and Challenges in Ad Hoc Wireless Networks 10 4 Security Attacks on Routing Protocols in Ad Hoc Wireless Net- works 11 4.1 Attacks using Impersonation . . . . . . . . . . . . . . . . . . . . . . 12 4.2 Attacks using Modification . . . . . . . . . . . . . . . . . . . . . . . 13 4.3 Attacks using Fabrication . . . . . . . . . . . . . . . . . . . . . . . . 14 4.4 Replay Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 4.5 Denial of Service (DoS) . . . . . . . . . . . . . . . . . . . . . . . . . 15 1 This works was supported by the DoD Defense-wide RDTE grant on Secure Telecom- munication Networks. 1 5 Security Mechanisms and Solutions for Routing Protocols in Ad Hoc Wireless Networks 16 5.1 Secure Efficient Ad hoc Distance Vector (SEAD) . . . . . . . . . . . 17 5.2 ARIADNE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 5.3 Security Aware Routing (SAR) . . . . . . . . . . . . . . . . . . . . . 18 5.4 Secure Routing Protocol (SRP) . . . . . . . . . . . . . . . . . . . . . 19 5.5 Secure Routing Protocol for Ad Hoc Networks (ARAN) . . . . . . . 20 5.6 Security Protocols for Sensor Network (SPINS) . . . . . . . . . . . . 22 5.7 Cooperation Of Nodes Fairness In Dynamic Ad-hoc NeTworks (CON- FIDANT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 5.8 Defense Mechanisms Against Rushing Attacks . . . . . . . . . . . . . 23 5.9 Defense Mechanisms Against Wormhole Attacks . . . . . . . . . . . 24 5.10 Defense Mechanisms Against Sybil Attacks . . . . . . . . . . . . . . 25 5.11 Security Mechanisms for Broadcast Operation . . . . . . . . . . . . . 26 6 Conclusions 28 References 1 Introduction to Ad Hoc Wireless Networks Wireless networks provide rapid, untethered access to information and com- puting, eliminating the barriers of distance, time, and location for many applications ranging from collaborative, distributed mobile computing to disaster recovery (such as fire, flood, earthquake), law enforcement (crowd control, search and rescue) and military communications (command, con- trol, surveillance, and reconnaissance). An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any...
View Full Document

Page1 / 32

10.1.1.123.2894 - Network Security Scott Huang, David...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online