Skip to main content

A Security Enhanced AODV Routing Protocol

  • Conference paper
Mobile Ad-hoc and Sensor Networks (MSN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3794))

Included in the following conference series:

  • 897 Accesses

  • 2 Citations

Abstract

Ad-hoc networks are characterized by open medium dynamic topology distributed cooperation and constrained capability. These characteristics set more challenges for security. If the routing protocol is attacked, the whole network would have been paralyzed. As a result, routing security is the most important factor in the security of the entire network. However, few of current routing protocols have the consideration about the security problems. The potential insecure factors in the AODV protocol are analyzed. Furthermore, a security routing protocol based on the credence model is proposed, which can react quickly when detecting some malicious behaviors in the network and effectively protect the network from kinds of attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Toh, C.-K.: Ad hoc Mobile Wireless Networks: Protocols and Systems, pp. 55–77. Prentice Hall PTR, Englewood Cliffs (2002)

    Google Scholar 

  2. Yang, H.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications 11(1), 38–47 (2004)

    Article  Google Scholar 

  3. Papadimitos, P., Hass, Z.: Secure Routing for Mobile Ad Hoc Networks. CNDS (2002), http://wnl.ece.cornell.edu/Publications/cnds02.pdf

  4. Perkins, C.E., Royer, E.M., Das, S.R.: Ad-hoc On-Demand Distance Vector Routing(AODV)[EB/OL] (November 2002), http://www.ietf.org/internet-drafts/draft-ietf-manet-aodv-12.txt

  5. Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks. In: Proceedings of the MobiCom 2002, Atlanta, Georgia, USA, September 23-28 (2002)

    Google Scholar 

  6. Habib, A., Hafeeda, M.H., Bhargava, B.: Detecting Service Violation and DoS Attacks. In: Proceedings of Network and Distributed System Security Symposium, NDSS (2003)

    Google Scholar 

  7. Hu, Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications(WMCSA 2002), pp. 3–13. IEEE, Calicoon (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhe, L., Jun, L., Dan, L., Ye, L. (2005). A Security Enhanced AODV Routing Protocol. In: Jia, X., Wu, J., He, Y. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2005. Lecture Notes in Computer Science, vol 3794. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599463_30

Download citation

Publish with us

Policies and ethics