SCAN: self-organized network-layer security in mobile ad hoc networks
- 6 February 2006
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Journal on Selected Areas in Communications
- Vol. 24 (2), 261-273
- https://doi.org/10.1109/jsac.2005.861384
Abstract
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper, we describe SCAN, a unified network-layer security solution for such networks that protects both routing and data forwarding operations through the same reactive approach. SCAN does not apply any cryptographic primitives on the routing messages. Instead, it protects the network by detecting and reacting to the malicious nodes. In SCAN, local neighboring nodes collaboratively monitor each other and sustain each other, while no single node is superior to the others. SCAN also adopts a novel credit strategy to decrease its overhead as time evolves. In essence, SCAN exploits localized collaboration and information cross-validation to protect the network in a self-organized manner. Through both analysis and simulation results, we demonstrate the effectiveness of SCAN even in a highly mobile and hostile environment.Keywords
This publication has 17 references indexed in Scilit:
- Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc NetworksWireless Networks, 2005
- Link-level measurements from an 802.11b mesh networkPublished by Association for Computing Machinery (ACM) ,2004
- A secure routing protocol for ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- SEAD: secure efficient distance vector routing for mobile wireless ad hoc networksAd Hoc Networks, 2003
- A charging and rewarding scheme for packet forwarding in multi-hop cellular networksPublished by Association for Computing Machinery (ACM) ,2003
- Secure link state routing for mobile ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Securing ad hoc routing protocolsPublished by Association for Computing Machinery (ACM) ,2002
- The quest for security in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2001
- Intrusion detection in wireless ad-hoc networksPublished by Association for Computing Machinery (ACM) ,2000
- Ad-hoc on-demand distance vector routingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1999