37
A Security protocol for Mobile A d-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

A Security protocol for Mobile Ad-hoc Networks

Thesis Report 

 Student: Lijun Jia

advisor: Dr. Mangir 

05/18/2007

Page 2: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

A Security protocol for Mobile Ad-hoc networks

Outline• Background

• Problem Statement

• Objective

• Methods Used

• Research Methodology

• Root causes of key Attacks against ad hoc network

• Defining Security Requirements

• Secure AODV (SAODV) Design

• Secure AODV (SAODV) Operation

• Performance Analysis of Secure AODV

• Effect of Malicious Node Behavior

Page 3: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

A Security protocol for Mobile Ad-hoc networks

BackgroundFeatures of Ad hoc networks:

• no fixed network infrastructure

• deployed as multi hop packet networks rapidly

• with relatively low expense

Such networks can be very useful in scenarios where natural conditions or time constraints make it impossible to pre-deploy infrastructure. Meanwhile, secure routing has become an excellent topic of open research because of the extraordinary gap between the nature of ad hoc network and the security required by its applications.

Page 4: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

A Security protocol for Mobile Ad-hoc networks

Problem Statement• Most current ad hoc network research has focused on providing rout

ing services without considering security. Many ad hoc routing protocols have been proposed, such as DSR,AODV,TORA, DSDV and WRP, but none of the proposals have defined security requirements. Therefore, normal ad hoc networks are easily attacked by malicious actions. We classify following three malicious behaviors against ad hoc routing protocols:

– Modification Attacks• Malicious modification of fields in protocol control messages can cause traf

fic redirection, and denial of service.

– Impersonation Attacks• Masquerading as another node (identity spoofing)

– Fabrication Attacks• Generation of false routing messages

Page 5: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

A Security Protocol for Mobile Ad-hoc Networks

Objective

• Identify the main issues for the attack action in ad hoc protocols, especially for AODV.

• Gain fundamental understanding of the effects on malicious actions.

• Find a robust solution to prevent attack actions in ad hoc network.

Page 6: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

A Security Protocol for Mobile Ad-hoc NetworksApproaches Used• Study the basic principal of ad hoc network • Review of the existing routing protocols. • Understand effects of key attacks against ad hoc network (External Attacks,

Internal Attacks). • Design security metrics/Design a set of related security components. • Extend the existing protocol using those components. • Security and network performance analysis.

• Research Methodology • The case study approach was used as a research methodology to accomplish our

thesis. – Firstly, most of the relevant researches have been extensively studied. – Secondly, we assume 4 cases in our simulations, and use OPNET Modeler 12.0

simulator to compare and evaluate the performance efficiency for AODV with and without security conditions based on following metrics.

• Five performance metrics are computed for each simulation: – 1) Packet Delivery Fraction, 2) Packet/Byte Overhead, 3) Average Route Latency, 4)

Average Path Length, and 5) Average End-to-End Delay of Data Packets:

Page 7: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Overview AODV• Definition

– Ad hoc On-Demand Distance Vector (AODV) routing protocol is a reactive routing protocol for MANET that maintains routes only between nodes that need to communicate.

• Features of AODV– Routing messages have small packets size.

– Build routes with the shortest path.

– Use source/destination sequence number (SN) to specify how fresh a route is

• AODV Operation– Route Discovery – Route Setup

– Route maintenance

AODV Route Establishment Process

Page 8: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Main Issues of Key Attacks against Ad Hoc Network (1)

1. Attacks using Modification:• Malicious modification of protocol messages • Examples :

– Redirection with modified sequence numbers – Redirection with modified hop counts – Tunneling attacks (Wormhole attack )

Main issues of AODV for the modification attack action :• In AODV protocol the main design issue is to achieve efficiency in ad hoc network environment, but no way to verify the routing metrics included in protocol packets, no message integrity. Therefore, an attacker can easily modify them and cause different security problems in routing.

Page 9: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Main Issues of key Attacks against ad hoc network (2)

2. Attacks using Impersonation :

• Masquerading as another node or Misrepresentation of identity by altering MAC or IP address in outgoing packets

• Examples :

– Forming routing loops by spoofing

Main issues of AODV for the impersonation attack action : • In AODV protocol, there is no message authentication. Therefore, an attacker can easily capture normal nodes, and then cause degradation in network communications, unreachable nodes, and possible routing loops .

(a) (b) (c)

Page 10: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Main Issues of key Attacks against ad hoc network (3)

3. Attacks using Fabrication :

• Generation of false routing messages• Examples :

– Falsifying route error messages

Main issues of AODV for the fabrication attack action : • In AODV protocol, there is no verification of message contents, and no non-repudiation. Therefore, the malicious node may insulate any node quite easily.

Page 11: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Defining Security Requirements

• Common Security Requirements:– No spoofing– No fabricated messages – No malicious alteration of routing messages – No routing loops – No route redirection – unauthorized nodes should be excluded from routing

• Secure Ad Hoc Routing – Properties and Techniques used to guarantee these properties:

Page 12: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Secure AODV (SAODV) Design (1)

• Our Secure AODV Protocol Metrics:– Timeliness: Routing updates need to be sent in a timely fashion. Timestamps and timeout

mechanisms can guarantee the freshness of the routes they provide. – Authentication: ensures the identity of the party with which communications are exchanged,

before granting it access to the network. – Non-repudiation: the originator of a message cannot deny having sent the message. If non-

repudiation is guaranteed, the receiver of a wrong message can prove that the

originator sent it, and that therefore the originator misbehaved. • Preliminary

– There is a key management subsystem to make it possible for each node to obtain public keys from the other nodes, called the trust third part.

– SAODV is an extension of the AODV routing protocol

Page 13: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Secure AODV (SAODV) Design (2)

• AODV Vs SAODV for Message Format

(AODV) (SAODV)

Page 14: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Secure AODV (SAODV) Operation (1)

• Timestamp – The timestamp is used to clear possible wraparound of the Message Sequence Number.

• SAODV Digital Signatures 1. Certification Setup

• Before entering the network, each node obtains a public key certificate from a trusted certificate server (the trust third part, T)

C[S ]= [ IPS || PKS || T || te ]PVT

2. Route Discovery • End-to-end authentication between source and destination • Hop-to-hop authentication between intermediate nodes • Source only trusts destination to choose return path

an example of secure ad hoc network

Page 15: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Secure AODV (SAODV) Operation (2)

• SAODV Digital Signatures (Continue)2. Route Discovery (continue)

• Source broadcasts signed RDM (Route Discovery Message) along with its own certificate.

• RDM contains the source IP address, along with a source-specific nonce (to detect duplicates)

S broadcasts RDM: = [RDM || IPD || C[S] || NS || t]PVS

• First hop adds its own signature and certificate

A rebroadcasts RDM: = [[RDM || IPD || C[S] || NS || t]PVS]PVA || C[A]

• Each hop verifies signature of previous hop and replaces it with its own – also adds a reverse route to source

B rebroadcasts RDM: = [[RDM || IPD || C[S] || NS || t]PVS]PVB || C[B]

• Destination also verifies the source signature

Page 16: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Secure AODV (SAODV) Operation (3)

• SAODV Digital Signatures (Continue)3. Route Reply (Route Setup)

• Destination sends back a signed reply (RRM) to the first RDM received

D to C RRM: = [RRM || IPS || C[D] || NS || t] PVD

• Again, RRM is signed by intermediate nodes, just like RDM – forward path setup

C to B RRM: = [[RRM || IPS || C[D] || NS || t] PVD] PVC || C[C]

B to A RRM: = [[RRM || IPS || C[D] || NS || t] PVD] PVB || C[B]

• Route discovered may not be the shortest, but is the “quickest” - likely to be the least loaded / congested at the time

Page 17: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Secure AODV (SAODV) Operation (4)

• SAODV Digital Signatures (Continue)4. Route Maintenance

• Nodes send signed error messages (RERR) to indicate link breaks, and packets arriving on deactivated paths

• ERR message contains IP address of originating node, along with its signature – enables non-repudiation

A broadcasts B REER: =[RERR || IPS || IPD || C[A] || NA || t]PVA

• Nonce included preventing replay attacks

• Summary for AODV Vs SAODV

Page 18: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Summary for AODV Vs SAODV

• AODV Vs SAODV for Diagram

(AODV) (SAODV)

Page 19: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Performance Analysis of Secure AODV (SAODV) (1)

• Network Performance Parameters– Performance of SAODV compared with AODV – Simulations using OPNET Modeler 12.0 (Educational Version) simulator – MAC layer is the IEEE 802.11 MAC protocol with Distributed Coordination

Function (DCF)– Traffic sources are CBR (constant bit-rate) – Route packet processing delay: 2ms

• Obtained through field testing of AODV– Digital signature generation delay: 8.5ms– Verification delay: 0.5ms

• Measured running times of RSA digital signature and verification algorithms

• Performance metrics– Packet Delivery Fraction

• the Average Routing Traffic Received • the Average Route Discovery Time

– Packet/Byte Overhead – Average Route Latency – Average Path Length – Average End-to-End Delay of Data Packets

Page 20: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Performance Analysis of Secure AODV (SAODV) (2)Four Cases are simulated:• Case 1: Distribution of nodes within IEEE 802.11 b physical layer:

– Scenario 1: Node Equalized Distribution – Scenario 2: Node Un-equalized Distribution

• Case 2: Effect of node mobility within IEEE 802.11 b physical layer – Scenario 3: Uniform Mobility – Scenario 4: Random Mobility

• Case 3: Effect of node moving speed within IEEE 802.11 b physical layer– Scenario 5: Based on Scenario 4 condition, with 3 different uniform node

velocities: 1m/s, 10m/s, and 20m/s to simulate

Case 1 Case 2 Case 3

Page 21: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Performance Analysis of Secure AODV (SAODV) (2)

The topology of Case 1

Page 22: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

the Average Routing Traffic Received (bits/sec)

Simulation Results

Page 23: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

the Average Route Discovery Time

Simulation Results

Page 24: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

the Average Packet/Byte Overhead

Simulation Results

Page 25: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

the Average Route Latency

Simulation Results

Page 26: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

the Average Path Length

Simulation Results

Page 27: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

the Average End-to-End Delay of Data Packets

Simulation Results

Page 28: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Case 4 Performance Analysis (1)

• Case 4: Effect of different standard of physical layer :– Scenario 6: repeat the process of Scenario 1 ~ Scenario 5 with

different standard of physical layer and compare what the different results with IEEE 802.11.b, IEEE 802.11.g and IEEE 802.11.a.

• Key Results

An example of the Average Routing Traffic Received (bits/sec) of Case 4 based on case 2 condition

• The efficiency of both AODV and SAODV with five metrics in IEEE 802.11a is much lower than that in IEEE 802.11b and g .• The efficiency in 802.11g is the same as that in 802.11b

Page 29: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Case 4 Performance Analysis (2)

• Analysis– The relationship with the signal transmitted and received power, frequency,

and distance: PR = PT / (2 * π * D * f / c)² C is speed of light

D is the transmitted distance

F is transmission frequency

– If power is the same, transmission frequency is higher, and then transmitted distance should be lower. The frequency in 802.11a is 5GHz, and in 802.11b is 2.4 GHz. This means the transmitted distance in 802.11a is about a half of that in 802.11b, in other word, that decreases the communication range. If using the same topology as 802.11b, most nodes with 802.11a are out of transmission range, and then the network connectivity decreases, thus, the average routing received traffic, routing load and average throughput should be low.

• Conclusion

IEEE802.11a is not profitable in ad hoc network/multi-hop networks to use exclusively the high coding schemes (OFDM)

Page 30: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Case 4 Performance Analysis(3)

• Case 4 Effect of transmitted distance in ad hoc network

Page 31: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Case 4 Performance Analysis(4)

• Conclusion

The transmitted distance can affect route topology,

throughput, and efficiency of the network

• Case 4 Effect of transmitted distance in ad hoc network (Continue)

Page 32: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

•Performance metrics _ simulations with 10 % malicious nodes for each protocol _Average Path Length _Routing Overhead

Effect of Malicious Node Behavior

an example of SAODV with 20% malicious nodes (red and

yellow circled nodes)

Page 33: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Average Path Length

• One of advantages of AODV is to get the shortest path in ad hoc network. But if this network contained malicious nodes, then non-shortest paths would be selected.

• The average path length increases 12.5% for AODV in the 10% of malicious node, but there is no change in SAODV

• This means malicious node behavior can not affect SAODV

Simulation Results

Page 34: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Routing Overhead

• Longer routes can cause greater routing overhead and longer data packet delay.

• Routing overhead with 10% of malicious nodes AODV is larger than normal AODV, and SAODV.

Simulation Results

Page 35: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

Conclusion and Future Works

Conclusion• Our SAODV is based on authentication, message integrity and

timeliness for an ad hoc environment as a part of a minimal security policy to detect and protect against malicious actions by third parties and peers in one particular ad hoc environment.

• Our evaluations show SAODV has minimal performance costs for the increased security in terms of processing and networking overhead.

• Our simulations based on five metrics proofed our SAOD is an efficient protocol.

Future Works• Study what effects for AODV and SAODV with standards of

physical layer: IEEE 802.11family • Study the key management of ad hoc network

Page 36: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

References• [1] C. E. Perkins and E. Royer, “Ad-hoc on-demand distance vector routing,” in Proc. of the 2nd IEEE Workshop on Mobile

Computing Systems and Applications, February 1999, pp. 90–100.• [2] E. Royer and C. Toh, “A review of current routing protocols for ad-hoc mobile wireless networks,” IEEE Personal Comm

unications, April 1999.• [3] D. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile Computing, vol. 353, pp. 153–1

81, 1996.• [4] Z. J. Haas, “A new routing protocol for the reconfigurable wireless network,” in Proceeding of 1997 IEEE 6th Internation

al Conference on Universal Personal Communications Record: Bridging the Way to• the 21st Century (ICUPC’97), October 1997, pp. 562–566.• [5] V. Park and M. Corson, “A highly adaptive distributed routing algorithm for mobile wireless networks,” in Proc. of INFO

COM’97, 1997.• [6] C. E. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile compu

ters,” in Proceedings of the ACM SIGCOMM’94. ACM Press, 1994, pp. 234–244.• [7] R. Ogier, F. Templin, and M. Lewis, “Topology Dissemination Based on Reverse-path Forwarding (TBRPF),” Request for

Comments RFC 3684, February, 2004, February 2004.• [8] L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network Magazine, vol. 13, no. 6, November/December 1999.• [9] S. Wu, F. Wang, and B. Vetter, “Secure routing protocols: Theory and practice,” NC State Univ., Tech. Rep., April 1998.• [10] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd Edition. John Wiley & Sons, Inc.,

1996.• [11] B. Schneier, Secrets and Lies: Digital Security in a Networked World.• 1st Edition. John Wiley & Sons, Inc., 2000.• [12] R. Ramanujan, A. Ahamad, J. Bonney, R. Hagelstrom, and K. Thurber, “Techniques for intrusion-resistant ad hoc routin

g algorithms (TIARA),” in IEEE Military Communications Conference, October 2000.• [13] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proceedings of

MOBICOM 2000, August 2000.• [14] J.-P. Hubaux, L. Buttyan, and S. Capkun, “The quest for security in mobile ad hoc networks,” in MobiHoc ’01: Proceedi

ngs of the 2nd ACM international symposium on Mobile ad hoc networking & computing, New York, NY, USA, 2001, pp. 146–155.

• [15] J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for mobile ad-hoc networks,” in IEEE International Conference on Network Protocols (ICNP), November 2001.

• [16] N. Asokan and P. Ginzboorg, “Key agreement in ad-hoc networks,” Computer Communications, vol. 23, no. 17, November 2000.

• [17] K. Fall and K. Varadhan, “ns notes and documentation,” available from http://www.isi.edu/nsnam/ns/, 2003.• [18] “IEEE Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” IEEE Std. 802.11-199

7, 1997.

Page 37: A Security protocol for Mobile Ad-hoc Networks Thesis Report Student: Lijun Jia advisor: Dr. Mangir 05/18/2007

•[19] B. Tuch, “Development of waveLAN, an ISM band wireless LAN,” AT&T Technical Journal, vol. 72, no. 4, pp. 27–37, July-Aug. 1993.

•[20] J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. G. Jetcheva, “A performance comparison of multihop wireless ad hoc network routing protocols,” in Proc. IEEE/ACM MOBICOM’98, October 1998, pp. 85–

•97.

•[21] Y. Hu, D. B. Johnson, and A. Perrig, “SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks,” in 4th IEEE Workshop on Mobile Computing Systems and Applications, June 2002.

•[22] Y. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demand routing protocol for ad hoc networks,” in 8th ACM International Conference on Mobile Computing and Networking (MobiCom 2002), September 2002.

•[23] F. Stajano and R. J. Anderson, “The resurrecting duckling: Security issues for ad hoc wireless networks,” in 7th Security Protocols Workshop, volume 1796 of Lecture Notes in Computer Science, 1999, pp. 172–194,.

•[24] F. Stajano, “The resurrecting duckling - what next?” in Security Protocols - 8th International Workshop, April 2001.

•[25] D. Balfanz, D. Smetters, P. Stewart, and H. C. Wong, “Talking to strangers: Authentication in ad-hoc wireless networks,” in Network and Distributed System Security Symposium Conference Proceedings,

•February 2002.

•[26] M. Steiner, G. Tsudik, and M. Waidner, “Key agreement in dynamic peer groups,” IEEE Trans. Parallel Distrib. Syst., vol. 11, no. 8, pp. 769–780, 2000.

•[27] S. Yi, P. Naldurg, and R. Kravets, “Security-aware ad hoc routing for wireless networks, Tech. Rep. UIUCDCS-R-2001-2241, August 2001.

•[28] P. Papadimitratos and Z. Haas, “Secure routing for mobile ad hoc networks,” in SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), January 2002.

•[29] L. Venkatraman and D. P. Agrawal, “Security scheme for routing in adhoc networks,” in Proceedings of the 13th International Conference on Wireless Communications, July 2001, pp. 129–146.

•[30] B. Dahill, B. Levine, C. Shields, and E. Royer, “Secure routing protocol for ad hoc networks,” U Mass, Tech. Rep. UM-CS-2001-037, 2001.

•[31] B. Smith and J. Garcia-Luna-Aceves, “Securing the border gateway routing protocol,” in Proceedings of Global Internet, November 1996.

•[32] B. Smith, S. Murthy, and J. Garcia-Luna-Aceves, “Securing distancevector routing protocols,” in Proceedings of the Symposium on Network and Distributed System Security (SNDSS’97), February 1997, pp. 85–92.

•[33] S. Murphy and M. Badger, “Digital signature protection of the OSPF routing protocol,” in Proceedings of the Symposium on Network and Distributed System Security (SNDSS’96), February 1996, pp. 93–102.

•[34] R. C. Merkle, “A digital signature based on a conventional encryption function,” in Advances in Cryptology-CRYPTO’87, August 1987.

•[35] S. Cheung, “An efficient message authentication scheme for link state routing,” in 13th Annual Computer Security Applications Conference, 1997.

•[36] R. Hauser, T. Przygienda, and G. Tsudik, “Reducing the cost of security in link-state routing,” in Symposium on Network and Distributed System Security (SNDSS’97), February 1997, pp. 93–99.

•[37] L. Reyzin and N. Reyzin, “Better than BiBa: Short one-time signatures with fast signing and verifying,” in Information Security and Privacy-7th Australasian Conference ACSIP, 2002.

•[38] K. Zhang, “Efficient protocols for signing routing messages,” in Proceedings of the 1998 Internet Society (ISOC) Symposium on Network and Distributed System Security, March 1998.

References