13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Prevent<strong>in</strong>g Replay Attacks for Secure Rout<strong>in</strong>g<strong>in</strong> Ad Hoc NetworksJane Zhen and Sampalli Sr<strong>in</strong>ivasDalhousie University, Halifax, NS, Canada, B3H 1W5{zhen,sr<strong>in</strong>i}@cs.dal.caAbstract. The design of secure rout<strong>in</strong>g techniques is a crucial and challeng<strong>in</strong>grequirement <strong>in</strong> mobile ad hoc network<strong>in</strong>g. This is due to the factthat the highly dynamic nature of the ad hoc nodes, their limited transmissionrange, and their reliance on an implicit trust model to routepackets make the rout<strong>in</strong>g protocols <strong>in</strong>herently susceptible to attacks. Wepropose a solution to prevent two important types of replay attacks onthe Ad Hoc On-Demand Distance Vector (AODV) rout<strong>in</strong>g protocol. Ourtechnique is based on strengthen<strong>in</strong>g the neighbor authentication mechanism<strong>by</strong> a simple extension to the AODV protocol. Analysis of thetechnique <strong>in</strong>dicates that it achieves security with little overhead.1 IntroductionAd hoc network<strong>in</strong>g is currently becom<strong>in</strong>g a popular wireless technology for manyapplications such as personal area network<strong>in</strong>g, disaster relief and rescue operations,and a variety of military, bus<strong>in</strong>ess and scientific applications. The attractivefeatures of such mobile ad hoc networks (MANET’s) <strong>in</strong>clude automaticself-configuration and self-ma<strong>in</strong>tenance, quick and <strong>in</strong>expensive deployment, andthe lack of the need for fixed network <strong>in</strong>frastructures or centralized adm<strong>in</strong>istration[1]. However, along side the advantages, a number of design challenges <strong>in</strong>MANET’s have emerged. One such crucial requirement is the design of securerout<strong>in</strong>g protocols. In such networks, the highly dynamic nature of the nodescan cause the network’s topology to change rapidly and unpredictably. Furthermore,wireless transmissions from each node are limited <strong>in</strong> their range. Due tothese reasons, the nodes must cooperate amongst themselves to exchange rout<strong>in</strong>g<strong>in</strong>formation and most rout<strong>in</strong>g algorithms for ad hoc networks rely on animplicit trust model to exchange <strong>in</strong>formation between neighbors. As a consequence,MANET rout<strong>in</strong>g protocols are vulnerable to a variety of attacks suchas eavesdropp<strong>in</strong>g, denial of service, packet <strong>in</strong>jection, traffic analysis and replayattacks [2]-[18].In this paper, we propose a solution to prevent two types of replay attackson the Ad Hoc On-Demand Distance Vector (AODV), which is currently on theverge of becom<strong>in</strong>g a standard rout<strong>in</strong>g protocol for ad hoc networks. The firsttype of replay attack is the wormhole attack, <strong>in</strong> which attackers tunnel RouteRequest (RREQ) packets from one node to another through a fast l<strong>in</strong>k such thatS. Pierre, M. Barbeau, and E. Kranakis (Eds.): ADHOC-NOW 2003, LNCS <strong>2865</strong>, pp. 140–150, 2003.c○ Spr<strong>in</strong>ger-Verlag Berl<strong>in</strong> Heidelberg 2003

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!