2001
DOI: 10.2172/787792
|View full text |Cite
|
Sign up to set email alerts
|

Routing Data Authentication in Wireless Networks

Abstract: In this paper, we discuss several specific threats directed at the routing data of an ad hoc network. We address security issues that arise from wrapping authentication mechanisms around ad hoc routing data. We show that this bolt-on approach to security may make certain attacks more difficult, but still leaves the network routing data vulnerable. We also show that under a certain adversarial model, most existing routing protocols cannot be secured with the aid of digital signatures. 4This page intentionally l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2002
2002
2010
2010

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…In the more general case, called wormhole attacks [14,15,16,17,18], the adversary repeats the update at one or more distant regions using an outof-band channel. As observed in [19], such attacks are unavoidable in BGP-type protocols (including both SS-BGP and S-BGP) if an attacking node can forward messages without modification such that its presence is never detected. 4 Thus, S-BGP does not offer any more protection than SS-BGP under these attacks.…”
Section: Route Truncation Attacksmentioning
confidence: 99%
“…In the more general case, called wormhole attacks [14,15,16,17,18], the adversary repeats the update at one or more distant regions using an outof-band channel. As observed in [19], such attacks are unavoidable in BGP-type protocols (including both SS-BGP and S-BGP) if an attacking node can forward messages without modification such that its presence is never detected. 4 Thus, S-BGP does not offer any more protection than SS-BGP under these attacks.…”
Section: Route Truncation Attacksmentioning
confidence: 99%
“…In a more active sense, an adversary may listen to network traffic, record and replay transmissions, and possibly inject false control information within the network. A MANET that does not secure its routing messages can be rendered non-functional when an adversary injects false topological information into the network [41]. In environments where a high-level of information security is required, all aspects of the network communications must be protected.…”
Section: Lower-layer Data Security In Manetsmentioning
confidence: 99%
“…If the intended target node is not in range or otherwise busy, it will not receive the data packet and the packet will be lost and the source node will believe otherwise. In either case, the network will suffer considerable performance degradations [41].…”
Section: Cryptographic Overheadmentioning
confidence: 99%