Secure routing in ad hoc networks and a related intrusion detection problem

Wensheng Zhang, R. Rao, Guohong Cao, George Kesidis

Research output: Contribution to conferencePaperpeer-review

27 Scopus citations

Abstract

The intrinsic nature of wireless ad hoc networks makes them vulnerable to various passive or active attacks. Thus, there is no guarantee that a routed communication path is free of malicious nodes that will not comply with the employed protocol and attempt to interfere the network operations. In this paper, we survey the problem of secure routing in ad hoc wireless networks, and discuss the related techniques of cryptographic key distribution. However, no matter how secure the routing protocol is, it is still possible that some nodes are comprimised and become malicious. The presence of comprimised nodes, especially in nodes that are communication bottlenecks, limit the effectiveness of the described secure routing protocols. We therefore consider the problem of intrusion detection for such nodes. The intrusion detection problem and some solutions are described in detail for a concrete queueing model of medium access. The extensions of the solutions to address the problem in more general scenarios are also discussed.

Original languageEnglish (US)
Pages735-740
Number of pages6
StatePublished - 2003
EventMILCOM 2003 - 2003 IEEE Military Communications Conference - Monterey, CA, United States
Duration: Oct 13 2003Oct 16 2003

Other

OtherMILCOM 2003 - 2003 IEEE Military Communications Conference
Country/TerritoryUnited States
CityMonterey, CA
Period10/13/0310/16/03

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Secure routing in ad hoc networks and a related intrusion detection problem'. Together they form a unique fingerprint.

Cite this