A secure and efficient link state routing protocol for ad hoc networks

Lin Chen, Jean Leneutre, Jean Jacques Puig

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Routing protocols in ad hoc networks are vulnerable to various attacks. Many solutions have been proposed to secure ad hoc routing protocols in recent research but often at the price of significant traffic and processing overhead, which may be undesirable for ad hoc networks with limited bandwidth and processing power. In this paper, we present and evaluate a secure and efficient link state routing protocol for ad hoc networks (SELRAN). We propose Secure Link State Update Procedure (SLSUP) and Secure Neighbor Establishment Procedure (SNEP) in SELRAN to counter external and internal uncoordinated attacks. We also use counter-based mechanism to reduce the broadcast overhead of the LSU packets in SELRAN, which makes SELRAN efficient in resource-constraint environments such as ad hoc networks. Analysis and simulation results show that SELRAN effectively thwarts a wide range of attacks to ad hoc routing, and is able to maintain high packet delivery ratio even in hostile environments.

Original languageEnglish
Title of host publicationSecond International Conference on Wireless and Mobile Communications, ICWMC 2006
PublisherIEEE Computer Society
Pages36
Number of pages1
ISBN (Print)0769526292, 9780769526294
DOIs
Publication statusPublished - 1 Jan 2006
Externally publishedYes
Event2nd International Conference on Wireless and Mobile Communications, ICWMC 2006 - Bucharest, Romania
Duration: 29 Jul 200631 Jul 2006

Publication series

NameSecond International Conference on Wireless and Mobile Communications, ICWMC 2006

Conference

Conference2nd International Conference on Wireless and Mobile Communications, ICWMC 2006
Country/TerritoryRomania
CityBucharest
Period29/07/0631/07/06

Fingerprint

Dive into the research topics of 'A secure and efficient link state routing protocol for ad hoc networks'. Together they form a unique fingerprint.

Cite this