Abstract
Routing security plays an important role in the security of the entire Mobile Ad hoc Network (MANET). In this paper we discuss the issue of private-preserving verification and detection of active attack and passive attack among the peers in MANET. Due to the variability of MANET, attack detection is difficult and usually needs to expose some private data from each node. Attackers can attempt to rewrite, discard the packets or tamper their own log against the expected security requirement to confidentially forwarding the messages. The routers can be easily attacked because of the lack of checking on the message transmission. In this paper, we present CRVad, a method detecting both active and passive attacks in ad hoc network while preserving the privacy of each node. Without introducing any third party to assist this approach, CRVad can be conducted using the information we already know in the MANET and it can detect attacks of multi-hops. CRVad consists of two phases, a reasoning phase with the known confidential information to infer the expected log information of the peers, and a verification phase using Merkle Hash Tree to verify the derived information without revealing any private information of the router. To show our approach can be used to detect the attacks, we conduct our experiment in NS3, and we report the experimental results on the correctness, and efficiency of our approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abusalah, L., Khokhar, A., Guizani, M.: A survey of secure mobile ad hoc routing protocols. IEEE Commun. Surv. Tutorials 10(4), 78–93 (2008)
Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: Proceedings of the 27th Australasian Conference on Computer Science, vol. 26, pp. 47–54. Australian Computer Society, Inc. (2004)
Papadimitriou, A., Zhao, M., Haeberlen, A.: Towards privacy-preserving fault detection. In: Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, Article no. 6. ACM (2013)
Haeberlen, A., Kouznetsov, P., Druschel, P.: Peerreview: practical accountability for distributed systems. In: ACM SIGOPS Operating Systems Review, vol. 41, pp. 175–188. ACM (2007)
Loo, B.T., Condie, T., Garofalakis, M., Gay, D.E., Hellerstein, J.M., Maniatis, P., Ramakrishnan, R., Roscoe, T., Stoica, I.: Declarative networking. Commun. ACM 52(11), 87–95 (2009)
Hauser, R., Przygienda, T., Tsudik, G.: Lowering security overhead in link state routing. Comput. Netw. 31(8), 885–894 (1999)
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing. Technical report (2003)
Johnson, D.B., Maltz, D.A., Hu, Y.C., Jetcheva, J.: The dynamic source routing (DSR) protocol for mobile ad hoc networks. IETF Draft, draft-ietf-manet-dsr-009. txt (2003)
Yi, S., Naldurg, P., Kravets, R.: Security-aware ad hoc routing for wireless networks. In: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 299–302. ACM (2001)
Venkatraman, L., Agrawal, D.P.: Strategies for enhancing routing security in protocols for mobile ad hoc networks. J. Parallel Distrib. Comput. 63(2), 214–227 (2003)
Haeberlen, A., Avramopoulos, I.C., Rexford, J., Druschel, P.: Netreview: detecting when interdomain routing goes wrong. In: NSDI, pp. 437–452 (2009)
Zhao, M., Zhou, W., Gurney, A.J., Haeberlen, A., Sherr, M., Loo, B.T.: Private and verifiable interdomain routing decisions. In: Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 383–394. ACM (2012)
Li, C.T., Hwang, M.S., Chu, Y.P.: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31(12), 2803–2814 (2008)
Merkle, R.C.: Protocols for public key cryptosystems. In: null, p. 122. IEEE (1980)
Acknowledgments
This work was supported by the Key Program of NSFC-Guangdong Union Foundation (No. U1135002), The Key Program of NSFC (No. U1405255), the National High Technology Research and Development Program (863 Program) of China (No. 2015AA011102, 2015AA011704), the National Natural Science Foundation of China (No. 61303033), and the Aviation Science Foundation of China (No. 2013ZC31003, 20141931001).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Li, T., Ma, J., Sun, C. (2015). CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9530. Springer, Cham. https://doi.org/10.1007/978-3-319-27137-8_33
Download citation
DOI: https://doi.org/10.1007/978-3-319-27137-8_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27136-1
Online ISBN: 978-3-319-27137-8
eBook Packages: Computer ScienceComputer Science (R0)