Abstract
In hostile Ad hoc network, the possibility of being attacked or attacking others can’t be avoided. Most current intrusion detection systems and secure routing protocols only focus on concrete attacking behaviors while neglecting the underlying attacking threat. So it’s inevitable to choose malicious nodes during routing establishment. To construct a secure multipath route, we present SEMAP, a secure enhancement mechanism based on Attacking Point (AP) which converts the possibility of security threat to a concrete metric. AP is a description of security status of a node. AP of a node can be easily extended to that of link, path and path set, which provides an important reference in route selection. Our design can exclude the nodes that will be the objects of adversaries from the network before actual routing process. Simulation results show that SEMAP provides an effective security enhancement without compromising the efficiency of original routing protocol.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wei, D.: Research on Intrusion Detection in Ad Hoc Network, PHD thesis, College of Automation ChongQin University, 5 (2006)
Zhang, Y., Lee, W., Huang, Y.: Intrusion detection technqiues for mobile wireless networks. ACM Wireless Networks 5, 545–556 (2003)
Fei, W., Yijun, M., Benxiong, H.: COSR: Cooperative On-Demand Secure Route Protocol in MANET. In: Proceedings of ISCIT 2006, pp. 890–893 (2006)
Guerrero, M.: Securing ad hoc routing protocols. IETF Internet Draft, 06 (2006)
Seung, Y., Prasad, N., Robin, K.: Security-aware ad hoc routing for wireless networks. In: Proceedings of MobiHoc 2001, pp. 299–302 (2001)
Yih-Chun, H., Adrian, P., Johnson David, B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 11(1-2), 21–38 (2005)
Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: Commun. Networks and Distributed Systems Modeling and Simulation Conference (CNDS) (2002)
Aad, I., Hubaux, J.-P., Knightly, E.W.: Denial of Service Resilience in Ad Hoc Networks. In: ACM MOBICOM, pp. 202–215 (2004)
Lee, S.J., Gerla, M.: Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks. In: Proceedings of the IEEE ICC, pp. 3201–3205 (2001)
Nasipuri,, Das, S.R.: On-Demand Multipath Routing for Mobile Ad Hoc Networks. In: Proceedings of IC3N (1999)
Ye, Z., Krishnamurthy, S.V., Tripathi, S.K.: A Framework for Reliable Routing in Mobile Ad Hoc Networks. In: IEEE INFOCOM (2003)
Marina, M.K., Das, S.R.: On-demand Multipath Distance Vector Routing in Ad Hoc Networks. In: Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP) (2001)
Wang, F., Huang, C., Zhao, J., Rong, C.: IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks. In: Proceeding of The IEEE 22nd International Conference on Advanced Information Networking and Applications, AINA 2008 (2008)
Goyal., D., Caffery Jr., J.: Partitioning Avoidance in Mobile Ad hoc Networks Using Network Survivability. In: Proceedings ISCC 2002, pp. 553–558 (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lu, Z., Huang, C., Wang, F., Rong, C. (2008). SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-69295-9_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69294-2
Online ISBN: 978-3-540-69295-9
eBook Packages: Computer ScienceComputer Science (R0)