skip to main content
10.1145/941311.941316acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

BISS: building secure routing out of an incomplete set of security associations

Published: 19 September 2003 Publication History

Abstract

We investigate secure routing in ad hoc networks in which security associations exist only between a subset of all pairs of nodes. We focus on source routing protocols. We show that to establish secure routes, it is in general not necessary that security associations exist between all pairs of nodes; a fraction of security associations is sufficient. We analyze the performance of existing proposals for secure routing in such conditions. We also propose a new protocol, designed specifically for ad hoc networks with an incomplete set of security associations between the nodes. We call this protocol BISS: a protocol for Building Secure Routing out of an Incomplete Set of Security Associations. We present a detailed analysis of this protocol, based on simulations, and show that it can be as secure as the existing proposals that rely on a complete set of security associations.

References

[1]
Y. Amir, Y. Kim, C. Nita-Rotaru, and G. Tsudik. On the Performance of Group Key Agreement Protocols. In Proceedings of ICDCS, 2002.
[2]
N. Asokan and P. Ginzboorg. Key Agreement in Ad Hoc Networks. Computer Communications, 23:1627--1637, 2000.
[3]
N. Ben Salem, L. Buttyán, J.-P. Hubaux, and M. Jakobsson. A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. In Proceedings of MobiHoc, 2003.
[4]
L. Blazević, L. Buttyán, S. Capkun, S. Giordano, J.-P. Hubaux, and J.-Y. Le Boudec. Self-Organization in Mobile Ad Hoc Networks: The Approach of Terminodes. IEEE Communications Magazine, June 2001.
[5]
R.B. Bobba, L. Eschenauer, V.D. Gligor, and W. Arbaugh. Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks. Technical Report TR 2002-44, University of Maryland, May 2002.
[6]
L. Buttyán and J.-P. Hubaux (Eds). Report on a Working Session on Security in Wireless Ad Hoc Networks. Mobile Computing and Communications Review, 7(1), 2003.
[7]
L. Buttyán and J.-P. Hubaux. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM/Kluwer Mobile Networks and Applications (MONET), 8(5), October 2003.
[8]
Haowen Chan, Adrian Perrig, and Dawn Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, May 2003.
[9]
M. Corner and B. Noble. Zero-interaction authentication. In Proceedings of MobiCom, 2002.
[10]
S. Capkun, L. Buttyán, and J.-P. Hubaux. Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing, 2(1), January-March 2003.
[11]
S. Capkun, J.-P. Hubaux, and L. Buttyán. Mobility Helps Security in Ad Hoc Networks. In Proceedings of MobiHoc, 2003.
[12]
J. Douceur. The Sybil attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), 2002.
[13]
O. Dousse, Francois Baccelli, and P. Thiran. Impact of interferences on connectivity in ad hoc networks. In Proceedings of Infocom, San Francisco, April 2003.
[14]
O. Dousse, P. Thiran, and Martin Hasler. Connectivity in ad-hoc and hybrid networks. In Proceedings of Infocom, pages 1079--1088, New York, June 2002.
[15]
L. Eschenauer and V. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and Communications Security, 2002.
[16]
M. Guerrero Zapata and N. Asokan. Securing Ad Hoc Routing Protocols. In Proceedings of the ACM Workshop on Wireless Security (WiSe), September 2002.
[17]
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of IEEE Infocom, April 2003.
[18]
Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In Proceedings of MobiCom, September 2002.
[19]
Y.-C. Hu, A. Perrig, and D. B. Johnson. Efficient Security Mechanisms for Routing Protocols. In Proceedings of NDSS, February 2003.
[20]
Y.-C. Hu, D. B. Johnson, and A. Perrig. Secure efficient distance vector routing in mobile wireless ad~hoc networks. In Proceedings of (WMCSA), June 2002.
[21]
J.-P. Hubaux, Th. Gross, J.-Y. Le Boudec, and M. Vetterli. Toward Self-Organized Mobile Ad Hoc Networks: The Terminodes Project. IEEE Communications Magazine, January 2001.
[22]
D. B. Johnson. Routing in Ad Hoc Networks of Mobile Hosts. In Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, December 1994.
[23]
J. Jubin and J.D. Turnow. The DARPA Packet Radio project. Proceedings of the IEEE, 1987.
[24]
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobile ad hoc networks. In Proceedings of the 9th International Conference on Network Protocols (ICNP), November 2001.
[25]
L. Lazos and R. Poovendran. Energy-Aware Secure Multicast Communication in Ad-hoc Networks Using Geographic Location Information. In Proceedings of IEEE International Conference on Acoustics Speech and Signal Processing, 2003.
[26]
A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.
[27]
G. Montenegro and C. Castelluccia. Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses. In Proceedings of NDSS, 2002.
[28]
G. O'Shea and M. Roe. Child-proof authentication for MIPv6 (CAM). ACM Computer Communications Review, April 2001.
[29]
P. Papadimitratos and Z.J. Haas. Secure Routing for Mobile Ad Hoc Networks. In Proceedings of CNDS, January 2002.
[30]
A. Perrig, R. Canetti, J.D. Tygar, and D. Song. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes, 5(Summer), 2002.
[31]
C. E. Perkins. Ad Hoc Networking. Addison Wesley Professional, December 2000.
[32]
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer. A Secure Routing Protocol for Ad hoc Networks. In Proceedings of the International Conference on Network Protocols (ICNP), November 2002.
[33]
F. Stajano. Security for Ubiquitous Computing. John Wiley and Sons, February 2002.
[34]
Y. Zhang and W. Lee. Intrusion Detection in Wireless Ad-Hoc Networks. In Proceedings of MobiCom, 2000.
[35]
L. Zhou and Z. Haas. Securing Ad Hoc Networks. IEEE Network, 13(6):24--30, 1999.

Cited By

View all

Index Terms

  1. BISS: building secure routing out of an incomplete set of security associations

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WiSe '03: Proceedings of the 2nd ACM workshop on Wireless security
    September 2003
    106 pages
    ISBN:1581137699
    DOI:10.1145/941311
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 September 2003

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ad hoc networks
    2. mobility
    3. routing
    4. security
    5. security associations

    Qualifiers

    • Article

    Conference

    WiSE03
    Sponsor:

    Acceptance Rates

    WiSe '03 Paper Acceptance Rate 10 of 41 submissions, 24%;
    Overall Acceptance Rate 10 of 41 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media