A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks - Communications and Multimedia Security Access content directly
Conference Papers Year : 2010

A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks

Abstract

Wireless routing protocols allow transmitting nodes to have some knowledge of the topology in order to decide when to forward a packet (via broadcast) and when to drop it. Since a routing protocol forms the backbone of any network, it is a lucrative target for attacks. Routing protocols for wired networks (such as S-BGP) are not scalable in an ad-hoc wireless environment because of two main drawbacks: (1) the need to maintain knowledge about all immediate neighbors (which requires a discovery protocol), and (2) the need to transmit the same update several times, one for each neighbor. Although information about neighbors is readily available in a fairly static and wired network, such information is often not updated or available in an ad-hoc wireless network with mobile devices. Consequently, S-BGP is not suitable for such scenarios. We propose a BGP-type wireless routing protocol for such networks that does not suffer from such drawbacks. The protocol uses a novel authentication primitive called Enhanced Chain Signatures (ECS).
Fichier principal
Vignette du fichier
CMS2010_final.pdf (244.23 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01056372 , version 1 (18-08-2014)

Licence

Attribution

Identifiers

Cite

Amitabh Saxena, Ben Soh. A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks. 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.4-15, ⟨10.1007/978-3-642-13241-4_2⟩. ⟨hal-01056372⟩
77 View
118 Download

Altmetric

Share

Gmail Facebook X LinkedIn More