Skip to main content

CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9530))

  • 1851 Accesses

Abstract

Routing security plays an important role in the security of the entire Mobile Ad hoc Network (MANET). In this paper we discuss the issue of private-preserving verification and detection of active attack and passive attack among the peers in MANET. Due to the variability of MANET, attack detection is difficult and usually needs to expose some private data from each node. Attackers can attempt to rewrite, discard the packets or tamper their own log against the expected security requirement to confidentially forwarding the messages. The routers can be easily attacked because of the lack of checking on the message transmission. In this paper, we present CRVad, a method detecting both active and passive attacks in ad hoc network while preserving the privacy of each node. Without introducing any third party to assist this approach, CRVad can be conducted using the information we already know in the MANET and it can detect attacks of multi-hops. CRVad consists of two phases, a reasoning phase with the known confidential information to infer the expected log information of the peers, and a verification phase using Merkle Hash Tree to verify the derived information without revealing any private information of the router. To show our approach can be used to detect the attacks, we conduct our experiment in NS3, and we report the experimental results on the correctness, and efficiency of our approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Abusalah, L., Khokhar, A., Guizani, M.: A survey of secure mobile ad hoc routing protocols. IEEE Commun. Surv. Tutorials 10(4), 78–93 (2008)

    Article  Google Scholar 

  2. Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: Proceedings of the 27th Australasian Conference on Computer Science, vol. 26, pp. 47–54. Australian Computer Society, Inc. (2004)

    Google Scholar 

  3. Papadimitriou, A., Zhao, M., Haeberlen, A.: Towards privacy-preserving fault detection. In: Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, Article no. 6. ACM (2013)

    Google Scholar 

  4. Haeberlen, A., Kouznetsov, P., Druschel, P.: Peerreview: practical accountability for distributed systems. In: ACM SIGOPS Operating Systems Review, vol. 41, pp. 175–188. ACM (2007)

    Google Scholar 

  5. Loo, B.T., Condie, T., Garofalakis, M., Gay, D.E., Hellerstein, J.M., Maniatis, P., Ramakrishnan, R., Roscoe, T., Stoica, I.: Declarative networking. Commun. ACM 52(11), 87–95 (2009)

    Article  Google Scholar 

  6. Hauser, R., Przygienda, T., Tsudik, G.: Lowering security overhead in link state routing. Comput. Netw. 31(8), 885–894 (1999)

    Article  Google Scholar 

  7. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing. Technical report (2003)

    Google Scholar 

  8. Johnson, D.B., Maltz, D.A., Hu, Y.C., Jetcheva, J.: The dynamic source routing (DSR) protocol for mobile ad hoc networks. IETF Draft, draft-ietf-manet-dsr-009. txt (2003)

    Google Scholar 

  9. Yi, S., Naldurg, P., Kravets, R.: Security-aware ad hoc routing for wireless networks. In: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 299–302. ACM (2001)

    Google Scholar 

  10. Venkatraman, L., Agrawal, D.P.: Strategies for enhancing routing security in protocols for mobile ad hoc networks. J. Parallel Distrib. Comput. 63(2), 214–227 (2003)

    Article  MATH  Google Scholar 

  11. Haeberlen, A., Avramopoulos, I.C., Rexford, J., Druschel, P.: Netreview: detecting when interdomain routing goes wrong. In: NSDI, pp. 437–452 (2009)

    Google Scholar 

  12. Zhao, M., Zhou, W., Gurney, A.J., Haeberlen, A., Sherr, M., Loo, B.T.: Private and verifiable interdomain routing decisions. In: Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 383–394. ACM (2012)

    Google Scholar 

  13. Li, C.T., Hwang, M.S., Chu, Y.P.: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31(12), 2803–2814 (2008)

    Article  Google Scholar 

  14. Merkle, R.C.: Protocols for public key cryptosystems. In: null, p. 122. IEEE (1980)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the Key Program of NSFC-Guangdong Union Foundation (No. U1135002), The Key Program of NSFC (No. U1405255), the National High Technology Research and Development Program (863 Program) of China (No. 2015AA011102, 2015AA011704), the National Natural Science Foundation of China (No. 61303033), and the Aviation Science Foundation of China (No. 2013ZC31003, 20141931001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Teng Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Li, T., Ma, J., Sun, C. (2015). CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9530. Springer, Cham. https://doi.org/10.1007/978-3-319-27137-8_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27137-8_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27136-1

  • Online ISBN: 978-3-319-27137-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy