Secure Routing and Intrusion Detection in Ad Hoc Networks
Loading...
Links to Files
Permanent Link
Author/Creator
Author/Creator ORCID
Date
2005-03-21
Type of Work
Department
Program
Citation of Original Publication
A. Patwardhan , J. Parker , A. Joshi, M. Iorga, T. Karygiannis , Secure Routing and Intrusion Detection in Ad Hoc Networks, Third IEEE International Conference on Pervasive Computing and Communications , 2005, DOI: 10.1109/PERCOM.2005.38
Rights
This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
Public Domain Mark 1.0
This work was written as part of one of the author's official duties as an Employee of the United States Government and is therefore a work of the United States Government. In accordance with 17 U.S.C. 105, no copyright protection is available for such works under U.S. Law.
Public Domain Mark 1.0
This work was written as part of one of the author's official duties as an Employee of the United States Government and is therefore a work of the United States Government. In accordance with 17 U.S.C. 105, no copyright protection is available for such works under U.S. Law.
Abstract
Numerous schemes have been proposed for
secure routing and Intrusion Detection for ad hoc networks.
Yet, little work exists in actually implementing
such schemes on small handheld devices. In this paper, we
present a proof-of-concept implementation of a secure routing
protocol based on AODV over IPv6, further reinforced
by a routing protocol independent Intrusion Detection
System (IDS) for ad hoc networks. Security features in the
routing protocol include mechanisms for non-repudiation
and authentication, without relying on the availability of
a Certificate Authority (CA) or a Key Distribution Center
(KDC). We present the design and implementation details
of our system, the practical considerations involved, and
how these mechanisms can be used to detect and thwart
malicious attacks. We discuss several scenarios where the
secure routing and intrusion detection mechanisms isolate
and deny network resources to nodes deemed malicious.We
also discuss shortcomings in our approach, and conclude
with lessons learned and ideas for future work.