A path authentication scheme for routing disruption attack prevention in ad hoc network

Li Joe Lin*, Shiuhpyng Shieh, Tzu I. Yang, Warren W. Lin

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Ad hoc routing protocols are vulnerable due to the absence of security mechanisms, allowing attacks such as forged routing advertisements to disrupt the routing scheme. Research work has been proposed for securing the routing protocol in ad hoc networks; however, solutions that utilize asymmetric cryptographic primitives are often infeasible in a constrained mobile environment. In this paper, we discover a strict, cooperative disruption attack on the route path and identify the deficiency of present security mechanisms for protecting routing information. We then propose a path authentication scheme which relies on efficient symmetric cryptographic primitives. The Random Assignment Path Authentication (RAPA) scheme guarantees the integrity of a complete request route path in the route discovery procedure and helps the current on-demand routing protocol in resisting routing disruption attacks.

Original languageEnglish
Title of host publication2006 IEEE International Conference on Systems, Man and Cybernetics
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1262-1268
Number of pages7
ISBN (Print)1424401003, 9781424401000
DOIs
StatePublished - 1 Jan 2006
Event2006 IEEE International Conference on Systems, Man and Cybernetics - Taipei, Taiwan
Duration: 8 Oct 200611 Oct 2006

Publication series

NameConference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
Volume2
ISSN (Print)1062-922X

Conference

Conference2006 IEEE International Conference on Systems, Man and Cybernetics
CountryTaiwan
CityTaipei
Period8/10/0611/10/06

Fingerprint Dive into the research topics of 'A path authentication scheme for routing disruption attack prevention in ad hoc network'. Together they form a unique fingerprint.

Cite this