Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard
problem after years of research. We therefore propose to design a
secure routing protocol in a new approach. This protocol starts from
a prerequisite secure status and fortifies this status by protecting
packets using identity-based cryptography and updating cryptographic
keys using threshold cryptography periodically or when necessary.
Compared to existing schemes, the main contribution of our proposal
is the notion of allowing only legitimate nodes to participate in
the bootstrapping process, rather than trying to detect adversary
nodes after they are participating in the routing protocol. Besides,
the proposal has several improvements in routing setup and maintenance:
it does not need any side channel or secret channel; it simplifies
secret updates without requiring a node to move around; it does not
use flooding to set up initial routing, and does not use multicast
to update secrets.
%0 Conference Paper
%1 Zhao08
%A Zhao, Shushan
%A Aggarwal, A.
%A Liu, Shuping
%A Wu, Huapeng
%B Wireless Communications and Networking Conference, 2008. WCNC 2008.
IEEE
%D 2008
%K MANET cryptographic_keys cryptographic_protocols identity-based_cryptography proactive_security_approach threshold_cryptography protocol ad-hoc network mobile radio routing secure security telecommunication
%P 2627 -2632
%R 10.1109/WCNC.2008.461
%T A Secure Routing Protocol in Proactive Security Approach for Mobile
Ad-Hoc Networks
%X Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard
problem after years of research. We therefore propose to design a
secure routing protocol in a new approach. This protocol starts from
a prerequisite secure status and fortifies this status by protecting
packets using identity-based cryptography and updating cryptographic
keys using threshold cryptography periodically or when necessary.
Compared to existing schemes, the main contribution of our proposal
is the notion of allowing only legitimate nodes to participate in
the bootstrapping process, rather than trying to detect adversary
nodes after they are participating in the routing protocol. Besides,
the proposal has several improvements in routing setup and maintenance:
it does not need any side channel or secret channel; it simplifies
secret updates without requiring a node to move around; it does not
use flooding to set up initial routing, and does not use multicast
to update secrets.
@inproceedings{Zhao08,
abstract = {Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard
problem after years of research. We therefore propose to design a
secure routing protocol in a new approach. This protocol starts from
a prerequisite secure status and fortifies this status by protecting
packets using identity-based cryptography and updating cryptographic
keys using threshold cryptography periodically or when necessary.
Compared to existing schemes, the main contribution of our proposal
is the notion of allowing only legitimate nodes to participate in
the bootstrapping process, rather than trying to detect adversary
nodes after they are participating in the routing protocol. Besides,
the proposal has several improvements in routing setup and maintenance:
it does not need any side channel or secret channel; it simplifies
secret updates without requiring a node to move around; it does not
use flooding to set up initial routing, and does not use multicast
to update secrets.},
added-at = {2011-07-15T15:18:02.000+0200},
author = {Zhao, Shushan and Aggarwal, A. and Liu, Shuping and Wu, Huapeng},
biburl = {https://www.bibsonomy.org/bibtex/26074ce42e29a6a16d881f525c4d96271/msteele},
booktitle = {Wireless Communications and Networking Conference, 2008. WCNC 2008.
IEEE},
doi = {10.1109/WCNC.2008.461},
file = {:I\:\\My Documents\\Thesis\\Research\\Zhao08.pdf:PDF},
interhash = {71091e1aae37338f54984ca9e6275700},
intrahash = {6074ce42e29a6a16d881f525c4d96271},
issn = {1525-3511},
keywords = {MANET cryptographic_keys cryptographic_protocols identity-based_cryptography proactive_security_approach threshold_cryptography protocol ad-hoc network mobile radio routing secure security telecommunication},
month = apr,
owner = {msteele},
pages = {2627 -2632},
review = {Provides a "secure" routing protocol based on cryptography.},
timestamp = {2011-07-15T19:57:22.000+0200},
title = {{A Secure Routing Protocol in Proactive Security Approach for Mobile
Ad-Hoc Networks}},
year = 2008
}