Enhancing the Security of On-demand Routing in Ad Hoc Networks

  • Zhenjiang Li
  • J. J. Garcia-Luna-Aceves
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3738)


We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity of the path discovered. The verification processes of route requests and route replies are independently executed while symmetrically implemented at the source and destination nodes, which makes AOSR easy to implement and computationally efficient, compared with prior approaches based on digital signing mechanisms. By binding the MAC address (physical address) with the ID of every node, we propose a reliable neighbor-node authentication scheme to defend against complex attacks, such as wormhole attacks. An interesting property of AOSR is the ”zero” communication overhead caused by the key establishment process, which is due to the exploitation of a Self-Certified Key (SCK) cryptosystem. Analysis and simulation results show that AOSR effectively detects or thwarts a wide range of attacks to ad hoc routing, and is able to maintain high packet-delivery ratios, even when a considerable percentage nodes are compromised.


Packet Delivery Ratio Route Discovery Pause Time Route Request Route Reply 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    The Network Simulator - NS2,
  2. 2.
    Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In: Proceedings of IEEE INFOCOM, San Francisco, USA, March 30 - April 3 (2003)Google Scholar
  3. 3.
    Hu, Y., Perrig, A., Johnson, D.: Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks. In: Proceedings of the 8th ACM International Conference on Mobile Computing and Networking, MobiCom (September 2002)Google Scholar
  4. 4.
    Perkins, C.E., Royer, E.M.: Ad Hoc On Demand Distance Vector Routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, pp. 90–100 (February 1999)Google Scholar
  5. 5.
    Petersen, H., Horster, P.: Self-Certified Keys - Concepts and Applications. In: Proceedings of the 3rd Conference of Communications and Multimedia Security, Athens, September 22-23 (1997)Google Scholar
  6. 6.
    Sanzgiri, K., Dahill, B., Levine, B.N., Royer, E., Shields, C.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of the 10th Conference on Network Protocols, ICNP (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Zhenjiang Li
    • 1
  • J. J. Garcia-Luna-Aceves
    • 1
    • 2
  1. 1.Computer EngineeringUniversity of California, Santa CruzSanta CruzUSA
  2. 2.Palo Alto Research Center (PARC)Palo AltoUSA

Personalised recommendations