A survey of secure mobile Ad Hoc routing protocols
- 1 January 2008
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Communications Surveys & Tutorials
- Vol. 10 (4), 78-93
- https://doi.org/10.1109/surv.2008.080405
Abstract
Several routing protocols have been proposed in recent years for possible deployment of mobile ad hoc networks (MANETs) in military, government and commercial applications. In this paper, we review these protocols with a particular focus on security aspects. The protocols differ in terms of routing methodologies and the information used to make routing decisions. Four representative routing protocols are chosen for analysis and evaluation including: Ad Hoc on demand Distance Vector routing (AODV), Dynamic Source Routing (DSR), Optimized Link State Routing (OLSR) and Temporally Ordered Routing Algorithm (TORA). Secure ad hoc networks have to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability. The analyses of the secure versions of the proposed protocols are discussed with respect to the above security requirements.Keywords
This publication has 54 references indexed in Scilit:
- How to lease the internet in your spare timeACM SIGCOMM Computer Communication Review, 2007
- Towards Autonomic and Situation-Aware Communication Services: the CASCADAS VisionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Policy-based architecture to enable autonomic communications - a position paperPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Accuracy characterization for metropolitan-scale Wi-Fi localizationPublished by Association for Computing Machinery (ACM) ,2005
- Overcoming the Internet impasse through virtualizationComputer, 2005
- The case for TCP/IP puzzlesACM SIGCOMM Computer Communication Review, 2003
- Delay-tolerant networking: an approach to interplanetary InternetIEEE Communications Magazine, 2003
- The dawning of the autonomic computing eraIBM Systems Journal, 2003
- Energy-efficient computing for wildlife trackingPublished by Association for Computing Machinery (ACM) ,2002
- Wireless security :Published by National Institute of Standards and Technology (NIST) ,2002