Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks

dc.contributor.authorBobba, Rakesh B.en_US
dc.contributor.authorEschenauer, Laurenten_US
dc.contributor.authorGligor, Virgil D.en_US
dc.contributor.authorArbaugh, Williamen_US
dc.contributor.departmentISRen_US
dc.date.accessioned2007-05-23T10:12:10Z
dc.date.available2007-05-23T10:12:10Z
dc.date.issued2002en_US
dc.description.abstractAbstractTo date, most solutions proposed for secure routing in mobile, ad-hoc networks (MANETs) assume that secure associations between pairs of nodes can be established on-line; e.g., by a trusted third party, by distributed trust establishment. However, establishing such security associations, with or without trusted third parties, requires reliance on routing layer security. In this paper, we eliminate this apparent cyclic dependency between security services and secure routing in MANETs and show how to bootstrap security for the routing layer. We use the notion of statistically unique and cryptographically verifiable (SUCV) identifiers to implement a secure binding between IP addresses and keys that is independent of any trusted security service. We illustrate our solution with the Dynamic Source Routing (DSR) protocol and argue that the solution is applicable to other protocols such as SEAD and Ariadne. We evaluate the cost of the DSR solution with simulations over ns-2 and present some preliminary results. <p>Index Termsobile ad-hoc networks, routing, security, DSRen_US
dc.format.extent62872 bytes
dc.format.mimetypeapplication/pdf
dc.identifier.urihttp://hdl.handle.net/1903/6276
dc.language.isoen_USen_US
dc.relation.ispartofseriesISR; TR 2002-44en_US
dc.subjectGlobal Communication Systemsen_US
dc.titleBootstrapping Security Associations for Routing in Mobile Ad-Hoc Networksen_US
dc.typeTechnical Reporten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR_2002-44.pdf
Size:
61.4 KB
Format:
Adobe Portable Document Format