Abstract
Location service, which provides current geographic positions of nodes, is one of the key elements of position-based routing schemes for ad hoc networks. In this paper, we define security threats of location service and propose a new secure location service protocol that uses self-signed locations. In our proposed protocol, nodes register their public keys in other nodes during the initialization phase and these registered keys are used to verify the locations of other nodes and to generate their self-signed locations. In this paper, we show that our protocol is robust against traditional attacks and new attacks that may occur in position-based routings. We also analyze the efficiency of our protocol using various simulations.
This research was supported by the MIC (Ministry of Information and Communication), Korea, under the HNRC (Home Network Research Center) - ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Assessment). This work was also supported by the Korea Science and Engineering Foundation(KOSEF) grant funded by the Korea government(MOST) (No. R01-2006-000-10957-0).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Royer, E.M., Toh, C.: A Review of Current Routing Protocols for Ad hoc Mobile Wireless Networks. IEEE Personal Communications 2(6), 46–55 (1999)
Das, S.M., Pucha, H., Hu, Y.C.: Performance Comparison of Scalable Location Services for Geographic Ad hoc Routing. In: Proc. of the IEEE INFOCOM 2005, vol. 2, pp. 1228–1239. IEEE, Los Alamitos (2005)
Friedman, R., Kliot, G.: Location Services in Wireless Ad hoc and Hybrid Networks: A Survey. Tech. Rep. CS-2006-10. Haifa Univ. (2006)
Camp, T., Boleng, J., Wilcox, L.: Location Information Services in Mobile Ad hoc Networks. In: Proc. of the IEEE Int. Conf. on Communications, vol. 5, pp. 3318–3324. IEEE, Los Alamitos (2005)
Woo, S.C., Singh, S.: Scalable Routing in Ad hoc Networks. Wireless Networks 7(5), 513–529 (2001)
Cheng, C.T., Lemberg, H.L., Philip, S.J., van den Berg, E., Zhang, T.: SLALoM: A Scalable Location Management Scheme for Large Mobile Ad-hoc Networks. In: Proc. of the IEEE Wireless Communications and Networking Conf., vol. 2, pp. 574–578. IEEE, Los Alamitos (2002)
Stojmenović, I., Peña, P.: A Scalable Quorum based Location Update Scheme for Routing in Ad hoc Wireless Networks. Tech. Rep. TR-99-09. Ottawa Univ. (1999)
Melamed, R., Keidar, I., Barel, Y.: Octopus: A Fault-Tolerant and Efficient Ad-hoc Routing Protocol. In: Proc. of the 24th IEEE Symp. on Reliable Distributed Systems, pp. 39–49. IEEE, Los Alamitos (2005)
Argyroudis, P.G., Mahony, D.O.: Secure Routing for Mobile Ad hoc Networks. In: IEEE Communications Surveys & Tutorials, vol. 73, pp. 2–27. IEEE, Los Alamitos (2005)
Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks. In: Proc. of the IEEE Workshop on Mobile Computing Systems and Applications, pp. 3–13. IEEE, Los Alamitos (2002)
Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks. In: Proc. of the 8th ACM Int. Conf. on MobiCom, pp. 12–23. ACM, New York (2002)
Zapata, M.G.: Secure Ad hoc On-demand Distance Vector routing. In: ACM Mobile Computing and Communications Review, vol. 6(3), pp. 106–107. ACM, New York (2002)
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A Secure Routing Protocol for Ad hoc Networks. In: Proc. of the 10th IEEE Int. Conf. on Network Protocols, pp. 78–87. IEEE, Los Alamitos (2002)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proc. of the 6th ACM Int. Conf. on Mobile Computing and Networking, pp. 255–265. ACM, New York (2000)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lim, J., Kim, S., Oh, H. (2007). A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds) Cryptology and Network Security. CANS 2007. Lecture Notes in Computer Science, vol 4856. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-76969-9_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-76969-9_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-76968-2
Online ISBN: 978-3-540-76969-9
eBook Packages: Computer ScienceComputer Science (R0)