secure routing and IDS - To appear in the Proceedings of...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
To appear in the Proceedings of the 3rd International Conference on Pervasive Computing and Communications(PerCom 2005), Kauai Island, Hawaii. Secure Routing and Intrusion Detection in Ad Hoc Networks Anand Patwardhan Jim Parker and Anupam Joshi UMBC, Baltimore, MD 21250 anand2, jparke2, joshi Michaela Iorga and Tom Karygiannis NIST, Gaithersburg, MD 20899 miorga, karygiannis Abstract — Numerous schemes have been proposed for secure routing and Intrusion Detection for ad hoc net- works. Yet, little work exists in actually implementing such schemes on small handheld devices. In this paper, we present a proof-of-concept implementation of a secure rout- ing protocol based on AODV over IPv6, further reinforced by a routing protocol independent Intrusion Detection System (IDS) for ad hoc networks. Security features in the routing protocol include mechanisms for non-repudiation and authentication, without relying on the availability of a Certificate Authority (CA) or a Key Distribution Center (KDC). We present the design and implementation details of our system, the practical considerations involved, and how these mechanisms can be used to detect and thwart malicious attacks. We discuss several scenarios where the secure routing and intrusion detection mechanisms isolate and deny network resources to nodes deemed malicious. We also discuss shortcomings in our approach, and conclude with lessons learned and ideas for future work. I. INTRODUCTION Recent years have witnessed a proliferation of mobile devices. Corporations and government agencies alike are increasingly using embedded and wireless technologies, and working towards mobilizing their workforce. Mobile devices typically support several forms of wireless con- nectivity like 802.11, IrDA, Bluetooth, GPRS etc. Due to technology limitations, however, wireless access to the service providing infrastructure (cell towers, WLAN base-stations) is limited to particular areas. Moreover, This research was supported by NSF award 9875433, and a grant from NIST buildings and other physical obstructions further restrict availability. Ad hoc networks, as the name suggests, have no sup- porting infrastructure. Ad hoc networks are comprised of a dynamic set of cooperating peers, which share their wireless capabilities with other similar devices to enable communication with devices not in direct radio-range of each other, effectively relaying messages on behalf of others. Conventional methods of identification and authentication are not available, since the availability of a CA or a KDC cannot be assumed. Consequently, mobile device identities or their intentions cannot be predetermined or verified. Several routing protocols for ad-hoc networks have
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 9

secure routing and IDS - To appear in the Proceedings of...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online