Performance, Computing, and Communications Conference, 2002. 21st IEEE International (2006)
Phoenix, AZ, USA
Apr. 10, 2006 to Apr. 12, 2006
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/.2006.1629460
I. Broustis , Dept. of Comput. Sci.&Eng., California Univ., Riverside, CA, USA
M. Faloutsos , Dept. of Comput. Sci.&Eng., California Univ., Riverside, CA, USA
S. Krishnamurthy , Dept. of Comput. Sci.&Eng., California Univ., Riverside, CA, USA
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the fact that a node can correctly validate who it is, but lie about its location and exploit this to create problems to the network. There are three main factors that make ad hoc networks more vulnerable: (a) nodes can overhear other nodes announcements, (b) nodes can lie about their location, and (c) nodes can avoid detection and isolation by moving. As a result, malicious nodes can fake their position and this way obstruct the routing. In this work, we explain how location and topology related malice can affect the security of wireless ad hoc networks. First, we present the most important attacks that can stem from misuse of location information. Second, we provide an overview of security routing approaches. Although several of the current techniques are promising, we conclude that there does not exist a bulletproof approach as of yet.
security routing, mobile environment, ad hoc network, location verification challenge, wireline network, topology related malice
I. Broustis, S. Krishnamurthy and M. Faloutsos, "Overcoming the challenge of security in a mobile environment," Performance, Computing, and Communications Conference, 2002. 21st IEEE International(PCC), Phoenix, AZ, USA, 2006, pp. 82.