Title :
Secure routing in ad hoc networks and a related intrusion detection problem
Author :
Zhang, Wensheng ; Rao, R. ; Cao, Guohong ; Kesidis, George
Author_Institution :
Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA, USA
Abstract :
The intrinsic nature of wireless ad hoc networks makes them vulnerable to various passive or active attacks. Thus, there is no guarantee that a routed communication path is free of malicious nodes that will not comply with the employed protocol and attempt to interfere the network operations. In this paper, we survey the problem of secure routing in ad hoc wireless networks, and discuss the related techniques of cryptographic key distribution. However, no matter how secure the routing protocol is, it is still possible that some nodes are compromised and become malicious. The presence of compromised nodes, especially in nodes that are communication bottlenecks, limit the effectiveness of the described secure routing protocols. We therefore consider the problem of intrusion detection for such nodes. The intrusion detection problem and some solutions are described in detail for a concrete queueing model of medium access. The extensions of the solutions to address the problem in more general scenarios are also discussed.
Keywords :
access protocols; ad hoc networks; cryptography; queueing theory; routing protocols; telecommunication security; compromised nodes; concrete queueing model; cryptographic key distribution; intrusion detection problem; medium access; secure routing protocols; wireless ad hoc networks; Ad hoc networks; Authentication; Computer science; Cryptographic protocols; Cryptography; Intelligent networks; Intrusion detection; Mobile ad hoc networks; Routing protocols; Wireless networks;
Conference_Titel :
Military Communications Conference, 2003. MILCOM '03. 2003 IEEE
Print_ISBN :
0-7803-8140-8
DOI :
10.1109/MILCOM.2003.1290203