Title
A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments
Abstract
To secure a mobile ad hoc network (MANET) in adversarial environments, a particularly challenging problem is how to feasibly detect and defend possible attacks on routing protocols, particularly internal attacks, such as a Byzantine attack. In this paper, we propose a novel algorithm that detects internal attacks by using both message and route redundancy during route discovery. The route-discovery messages are protected by pairwise secret keys between a source and destination and some intermediate nodes along a route established by using public key cryptographic mechanisms. We also propose an optimal routing algorithm with routing metric combining both requirements on a node's trustworthiness and performance. A node builds up the trustworthiness on its neighboring nodes based on its observations on the behaviors of the neighbor nodes. Both of the proposed algorithms can be integrated into existing routing protocols for MANETs, such as ad hoc on-demand distance vector routing (AODV) and dynamic source routing (DSR). As an example, we present such an integrated protocol called secure routing against collusion (SRAC), in which a node makes a routing decision based on its trust of its neighboring nodes and the performance provided by them. The simulation results have demonstrated the significant advantages of the proposed attack detection and routing algorithm over some known protocols.
Year
DOI
Venue
2009
10.1109/TVT.2008.923683
IEEE Transactions on Vehicular Technology
Keywords
Field
DocType
ad hoc on-demand distance vector routing,adversarial environments,routing protocol,byzantine attacks,ad hoc network,security,route-discovery messages,dynamic source routing,secure routing protocol,route redundancy,mobile ad hoc network,mobile radio,public key cryptography,optimal routing algorithm,routing protocols,manet,secure routing,ad hoc networks,mobile,ad hoc on demand distance vector routing,authentication,data security,public key,mobile ad hoc networks,open systems,information security
Link-state routing protocol,Dynamic Source Routing,Static routing,Computer science,Computer network,Destination-Sequenced Distance Vector routing,Wireless Routing Protocol,Optimized Link State Routing Protocol,Routing protocol,Zone Routing Protocol,Distributed computing
Journal
Volume
Issue
ISSN
58
1
0018-9545
Citations 
PageRank 
References 
33
1.16
25
Authors
3
Name
Order
Citations
PageRank
Ming Yu111310.43
MengChu Zhou28989534.94
Wei Su362938.52