%0 Conference Proceedings %T A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks %+ Dept. of Computer Science %+ Dept. of Computer Science %A Saxena, Amitabh %A Soh, Ben %< avec comité de lecture %( Lecture Notes in Computer Science %B 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS) %C Linz, Austria %Y Bart Decker; Ingrid Schaumüller-Bichl %I Springer %3 Communications and Multimedia Security %V LNCS-6109 %P 4-15 %8 2010-05-31 %D 2010 %R 10.1007/978-3-642-13241-4_2 %Z Computer Science [cs]/Digital Libraries [cs.DL]Conference papers %X Wireless routing protocols allow transmitting nodes to have some knowledge of the topology in order to decide when to forward a packet (via broadcast) and when to drop it. Since a routing protocol forms the backbone of any network, it is a lucrative target for attacks. Routing protocols for wired networks (such as S-BGP) are not scalable in an ad-hoc wireless environment because of two main drawbacks: (1) the need to maintain knowledge about all immediate neighbors (which requires a discovery protocol), and (2) the need to transmit the same update several times, one for each neighbor. Although information about neighbors is readily available in a fairly static and wired network, such information is often not updated or available in an ad-hoc wireless network with mobile devices. Consequently, S-BGP is not suitable for such scenarios. We propose a BGP-type wireless routing protocol for such networks that does not suffer from such drawbacks. The protocol uses a novel authentication primitive called Enhanced Chain Signatures (ECS). %G English %2 https://inria.hal.science/hal-01056372/document %2 https://inria.hal.science/hal-01056372/file/CMS2010_final.pdf %L hal-01056372 %U https://inria.hal.science/hal-01056372 %~ IFIP-LNCS %~ IFIP %~ IFIP-LNCS-6109 %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-TC6 %~ IFIP-CMS %~ IFIP-2010