1st International ICST Conference on Communications and Networking in China

Research Article

A Cumulative Authentication Method for Securing Source Routing Protocols in Ad Hoc Networks

  • @INPROCEEDINGS{10.1109/CHINACOM.2006.344696,
        author={B. Moussakhani and S.M. Safavi and H. Ebrahimzad},
        title={A Cumulative Authentication Method for Securing Source Routing Protocols in Ad Hoc Networks},
        proceedings={1st International ICST Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2007},
        month={4},
        keywords={Ad hoc networks; routing ; security; cryptography; random key predistributions.},
        doi={10.1109/CHINACOM.2006.344696}
    }
    
  • B. Moussakhani
    S.M. Safavi
    H. Ebrahimzad
    Year: 2007
    A Cumulative Authentication Method for Securing Source Routing Protocols in Ad Hoc Networks
    CHINACOM
    IEEE
    DOI: 10.1109/CHINACOM.2006.344696
B. Moussakhani1,2,*, S.M. Safavi1,3,*, H. Ebrahimzad1,3,*
  • 1: Amirkabir University of Technology, Iran Telecommunication Research
  • 2: Center (ITRC),Tehran, Iran
  • 3: Center (ITRC), Tehran, Iran
*Contact email: babak.moossakhani@gmail.com, msafavi@aut.ac.ir, H_ebrahimzad@yahoo.com

Abstract

Initial works in ad hoc routing have considered only the problem of providing efficient mechanisms for finding paths in such networks, without considering security as a major problem. In such a trusted environment, malicious behaviors can disturb routing process. We present the design and performance evaluation of a new secure on-demand routing protocol for ad hoc networks, called CASR. CASR is robust against attackers from outside of the network and even it prevents compromised nodes from tampering with uncompromised routes consisting of uncompromised nodes. Because of using symmetric cryptography in its structure, CASR is robust against large number of types of denial-of-service attacks. However, due to the applying of the random key predistributions method to the routing process our proposed scheme reaches a trade-off between the degree of security and complexity.