Sciweavers

Share
PERCOM
2005
ACM

Secure Routing and Intrusion Detection in Ad Hoc Networks

9 years 6 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept implementation of a secure routing protocol based on AODV over IPv6, further reinforced by a routing protocol-independent Intrusion Detection and Response system for ad-hoc networks. Security features in the routing protocol include mechanisms for non-repudiation, authentication using Statistically Unique and Cryptographically Verifiable (SUCV) identifiers, without relying on the availability of a Certificate Authority (CA), or a Key Distribution Center (KDC). We present the design and implementation details of our system, the practical considerations involved, and how these mechanisms can be used to detect and thwart malicious attacks. We discuss several scenarios where the secure routing and intrusion detection mechanisms isolate and deny network resources to nodes deemed malicious. We also discuss shortcomi...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae
Added 24 Dec 2009
Updated 24 Dec 2009
Type Conference
Year 2005
Where PERCOM
Authors Anand Patwardhan, Jim Parker, Anupam Joshi, Michaela Iorga, Tom Karygiannis
Comments (0)
books