Ariadne: A secure on-demand routing protocol for ad hoc networks

Yih Chun Hu, Adrian Perrig, David B. Johnson

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

An ad hoc network is a group of wireless mobile computers (or nodes), in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Prior research in ad hoc networking has generally studied the routing problem in a non-adversarial setting, assuming a trusted environment. In this paper, we present attacks against routing in ad hoc networks, and we present the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne, Ariadne prevents attackers or compromised nodes from tampering with uncompromised routes consisting of uncompromised nodes, and also prevents a large number of types of Denial-of-Service attacks. In addition, Ariadne is efficient, using only highly efficient symmetric cryptographic primitives.

Original languageEnglish (US)
Title of host publicationProceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
PublisherAssociation for Computing Machinery
Pages12-23
Number of pages12
ISBN (Print)9781581134865
StatePublished - 2002
Externally publishedYes
EventProceedings of The Eight Annual International Conference on Mobile Computing and Networking - Atlanta, GA, United States
Duration: Sep 23 2002Sep 28 2002

Publication series

NameProceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM

Other

OtherProceedings of The Eight Annual International Conference on Mobile Computing and Networking
Country/TerritoryUnited States
CityAtlanta, GA
Period9/23/029/28/02

Keywords

  • Ad hoc network routing
  • Routing
  • Security

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Ariadne: A secure on-demand routing protocol for ad hoc networks'. Together they form a unique fingerprint.

Cite this