A path authentication scheme for routing disruption attack prevention in ad hoc network

Li Joe Lin*, Shiuhpyng Shieh, Tzu I. Yang, Warren W. Lin

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    Ad hoc routing protocols are vulnerable due to the absence of security mechanisms, allowing attacks such as forged routing advertisements to disrupt the routing scheme. Research work has been proposed for securing the routing protocol in ad hoc networks; however, solutions that utilize asymmetric cryptographic primitives are often infeasible in a constrained mobile environment. In this paper, we discover a strict, cooperative disruption attack on the route path and identify the deficiency of present security mechanisms for protecting routing information. We then propose a path authentication scheme which relies on efficient symmetric cryptographic primitives. The Random Assignment Path Authentication (RAPA) scheme guarantees the integrity of a complete request route path in the route discovery procedure and helps the current on-demand routing protocol in resisting routing disruption attacks.

    Original languageEnglish
    Title of host publication2006 IEEE International Conference on Systems, Man and Cybernetics
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages1262-1268
    Number of pages7
    ISBN (Print)1424401003, 9781424401000
    DOIs
    StatePublished - 1 Jan 2006
    Event2006 IEEE International Conference on Systems, Man and Cybernetics - Taipei, Taiwan
    Duration: 8 Oct 200611 Oct 2006

    Publication series

    NameConference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
    Volume2
    ISSN (Print)1062-922X

    Conference

    Conference2006 IEEE International Conference on Systems, Man and Cybernetics
    Country/TerritoryTaiwan
    CityTaipei
    Period8/10/0611/10/06

    Fingerprint

    Dive into the research topics of 'A path authentication scheme for routing disruption attack prevention in ad hoc network'. Together they form a unique fingerprint.

    Cite this