Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1229285.1229339acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
Article

DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET

Published: 20 March 2007 Publication History

Abstract

A Mobile Ad Hoc Network (MANET) is a group of mobile wireless nodes that can communicate with each other without pre-established base stations. Their communication relies on cooperative forwarding behavior, and therefore, routing service is critical for MANET. Most routing protocols depend on forwarded routing messages. If a malicious node propagates forged routing information through forwarded routing messages, all other nodes' routing tables will be damaged. We first propose Distributed Routing Evidence Tracing and Authentication intrusion prevention model (DRETA) for MANET routing protocols. DRETA provides low computation authentication service by adopting one-way key chain with delayed key disclosure. DRETA proposes Previous Forwarder (PF), which is a scalable technique for tracing and protecting the routing evidence of forwarded routing messages. Second, we implement DRETA in two representative routing protocols in MANET, Ad-hoc On-demand Distance Vector routing protocol (AODV) and Optimized Link State Routing protocol (OLSR). Experimental results show that DRETA is accurate, scalable, and requires low message overhead, and offers small delays under high mobility conditions.

References

[1]
Perrig, R. Canetti, D. Tygar and D. Song, "The TESLA broadcast authentication protocol," In Cryptobytes (RSA Laboratories, Summer/Fall 2002), 5(2):2--13, 2002.
[2]
N. Haller, "The S/Key one-time password system", Internet Society 1994.
[3]
H. Krawczyk, M. Bellare, and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication", IETF RFC 2104
[4]
C. Perkins, E. Belding-Royer, and S. Das. "Ad Hoc On Demand Distance Vector Routing", IETF RFC 3561
[5]
T. Clausen and P. Jacquet, "Optimized Link State Routing Protocol", IETF RFC 3626
[6]
Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, and Karl Levitt, "DEMEM: Distributed Evidence-driven Message Exchange intrusion detection Model for MANET", Proceeding of the 9th International Symposium, Recent Advances in Intrusion Detection, Hamburg, Germany, September 20--22, 2006
[7]
F. Anjum and R. Talpade, "LiPad: Lightweight Packet Drop Detection for Ad Hoc Networks," In Proceedings of the 2004 IEEE 60th Vehicular Technology Conference, Los Angeles, September 2004.
[8]
Jorge Nuevo, "A Comprehensible GloMoSim Tutorial", March 2004
[9]
Y. Zhang and W. Lee, "Intrusion Detection in Wireless Ad Hoc Networks", Proceedings of the 6th International Conference on Mobile Computing and Networking, Boston, MA, August 2000.

Cited By

View all
  • (2007)Cost-sensitive intrusion responses for mobile ad hoc networksProceedings of the 10th international conference on Recent advances in intrusion detection10.5555/1776434.1776444(127-145)Online publication date: 5-Sep-2007
  • (2007)Cost-Sensitive Intrusion Responses for Mobile Ad Hoc NetworksRecent Advances in Intrusion Detection10.1007/978-3-540-74320-0_7(127-145)Online publication date: 2007

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security
March 2007
323 pages
ISBN:1595935746
DOI:10.1145/1229285
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 March 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. AODV
  2. DEMEM
  3. DRETA
  4. HMAC
  5. MANET
  6. OLSR
  7. delayed key disclosure
  8. forwarded message
  9. one-way key chain
  10. previous forwarder
  11. validation message

Qualifiers

  • Article

Conference

Asia CCS07
Sponsor:

Acceptance Rates

ASIACCS '07 Paper Acceptance Rate 33 of 180 submissions, 18%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2007)Cost-sensitive intrusion responses for mobile ad hoc networksProceedings of the 10th international conference on Recent advances in intrusion detection10.5555/1776434.1776444(127-145)Online publication date: 5-Sep-2007
  • (2007)Cost-Sensitive Intrusion Responses for Mobile Ad Hoc NetworksRecent Advances in Intrusion Detection10.1007/978-3-540-74320-0_7(127-145)Online publication date: 2007

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media