You are here

Kablosuz Ağlarda Güvenli Yönlendirme Protokolleri

Secure Routing Protocols in Wireless Networks

Journal Name:

Publication Year:

Keywords (Original Language):

Abstract (2. Language): 
Mobile Ad-hoc Networks are self-organized automatically and communicate with each other. A node can communicate with any other node that is outside its wireless transmission range by forwarding packets hop by hop. Security is difficult in wireless networks compared to wired networks, because of the wireless medium. To assure security in wireless networks, data packets must be routed through secure paths. In this paper, wireless technologies and secure routing protocols proposed for these technologies are reviewed. Solution methods of the protocols, advantages and disadvantages are investigated, and compared with each other. Finally, future research directions for secure routing are given.
Abstract (Original Language): 
Mobil tasarsız ağlar kendi kendilerini otomatik olarak düzenler ve kablosuz iletişim yaparlar. Bir düğüm erişim mesafesi dışında olan düğümlerle diğer düğümler aracılığıyla paketlerin bir düğümden diğer düğüme iletilmesini sağlayarak haberleşebilmektedir. Kablosuz ağlarda iletişim herkese açık ortamda yapıldığı için veri güvenliğinin sağlanması kablolu ağlara göre daha zordur. Güvenliğin sağlanabilmesi için veri paketlerinin güvenli yollar seçilerek yönlendirilmesi gerekmektedir. Bu çalışmada kablosuz teknolojiler ve bu teknolojiler için önerilmiş güvenli yönlendirme protokolleri ele alınarak incelenmiştir. Bu protokollerin çözüm yöntemleri, avantajları ve dezavantajları araştırılmış ve birbirleriyle karşılaştırılmıştır. Son olarak güvenli yönlendirme için çalışma yapılabilecek araştırma konuları önerilmiştir.
7-13

REFERENCES

References: 

[1] N. P. Reid, R. Seide, Wi-Fi (802.11) Network Handbook:
Osborne/McGraw-Hill, 2002.
[2] A. Perrig, J. D. Tygar, Secure Broadcast Communication in
Wired and Wireless Networks: Springer, 2003. BİLİŞİM TEKNOLOJİLERİ DERGİSİ, CİLT: 1, SAYI: 3, EYLÜL 2008 13
[3] N. Abramson, “Development of the Alohanet,” Ieee Transactions
on Information Theory, vol. 31, no. 2, pp. 119-123, 1985.
[4] B. P. Crow, I. Widjaja, J. G. Kimvd., “IEEE 802.11 wireless local
area networks,” Ieee Communications Magazine, vol. 35, no. 9,
pp. 116-126, Sep, 1997.
[5] M. S. Kuran, T. Tugcu, “A survey on emerging broadband
wireless access technologies,” Computer Networks, vol. 51, no.
11, pp. 3013-3046, Aug 8, 2007.
[6] K. Cleary, “Internet via MMDS”, International Broadcasting
Convention, pp. 79-82, 1997.
[7] A. Nordbotten, “LMDS systems and their application,”
Communications Magazine, IEEE, vol. 38, no. 6, pp. 150-154,
2000.
[8] B. Fong, N. Ansari, A. C. M. Fongvd., “On the scalability of fixed
broadband wireless access network deployment,”
Communications Magazine, IEEE, vol. 42, no. 9, pp. S12-S18,
2004.
[9] “IEEE Standard for Local and Metropolitan Area Networks Part
16: Air Interface for Fixed Broadband Wireless Access Systems,”
IEEE Std 802.16-2004 (Revision of IEEE Std 802.16-2001), pp.
1-857, 2004.
[10] M. Cao, W. C. Ma, Q. Zhangvd., “Analysis of IEEE 802.16 mesh
mode scheduler performance,” Ieee Transactions on Wireless
Communications, vol. 6, no. 4, pp. 1455-1464, Apr, 2007.
[11] “IEEE Standards for Local and metropolitan area networks - Part
16: Air Interface for Fixed and Mobile Broadband Wireless
Access Systems - Amendment 3: Management Plane Procedure
and Services,” IEEE Std 802.16g 2007 (Amendment to IEEE Std
802.16-2004), pp. 1-202, 2007.
[12] “IEEE Standard for Local and metropolitan area networks Part
16: Air Interface for Fixed and Mobile Broadband Wireless
Access Systems Amendment 2: Physical and Medium Access
Control Layers for Combined Fixed and Mobile Operation in
Licensed Bands and Corrigendum 1,” IEEE Std 802.16e-2005 and
IEEE Std 802.16-2004/Cor 1-2005 (Amendment and
Corrigendum to IEEE Std 802.16-2004), pp. 1-822, 2006.
[13] “IEEE Standard for Local and metropolitan area networks Part
16: Air Interface for Fixed Broadband Wireless Access Systems-
Amendment 1: Management Information Base,” IEEE Std
802.16f-2005 (Amendment to IEEE Std 802.16-2004), pp. 1-245,
2005.
[14] “IEEE Standard for Local and Metropolitan Area Networks
Media Access Control (MAC) Bridges Amendment 5: Bridging
of IEEE 802.16,” 802.16k-2007 (Amendment to IEEE Std
802.1D-2004), pp. 1-14, 2007.
[15] W. Bolton, X. Yang, M. Guizani, “IEEE 802.20: mobile
broadband wireless access,” Wireless Communications, IEEE [see
also IEEE Personal Communications], vol. 14, no. 1, pp. 84-95,
2007.
[16] “IEEE Draft Standard for Local and Metropolitan Area Networks
- Standard Air Interface for Mobile Broadband Wireless Access
Systems Supporting Vehicular Mobility - Physical and Media
Access Control Layer Specification,” IEEE Unapproved Draft Std
802.20/D4.1m, 2008.
[17] E. Cole, R. Krutz, J. W. Conley, Network Security Bible: Wiley
Pub., 2005.
[18] H. Li, Z. Chen, X. Qinvd., “Secure routing in wired networks and
wireless ad hoc networks,” Technical Report, 2002.
[19] D. B. Johnson, D. A. Maltz, “Dynamic Source Routing in Ad Hoc
Wireless Networks,” Mobile Computing, 1996.
[20] Y.-C. Hu, D. B. Johnson, A. Perrig, “SEAD: secure efficient
distance vector routing for mobile wireless ad hoc networks,” Ad
Hoc Networks, vol. 1, no. 1, pp. 175-192, 2003.
[21] E. P. Charles, B. Pravin, “Highly dynamic Destination-Sequenced
Distance-Vector routing (DSDV) for mobile computers,”
SIGCOMM Comput. Commun. Rev., vol. 24, no. 4, pp. 234-244,
1994.
[22] Y. C. Hu, A. Perrig, D. B. Johnson, “Ariadne: A secure ondemand routing protocol for ad hoc networks,” Wireless
Networks, vol. 11, no. 1-2, pp. 21-38, Jan-Mar, 2005.
[23] A. Perrig, R. Canetti, D. Tygarvd., “The TESLA Broadcast
Authentication Protocol,” vol. 5, no. 2, pp. 2-13, 2002.
[24] Y. C. Hu, A. Perrig, D. B. Johnson, “Wormhole detection in
wireless ad hoc networks,” Department of Computer Science,
Rice University, Tech. Rep. TR01-384, June, 2002.
[25] Y. Seung, N. Prasad, K. Robin, “Security-aware ad hoc routing
for wireless networks”, Proceedings of the 2nd ACM
international symposium on Mobile ad hoc networking and
computing, Long Beach, CA, USA, 2001,
[26] C. E. Perkins, E. M. Royer, “Ad-hoc on-demand distance vector
routing”, Mobile Computing Systems and Applications, 1999.
Proceedings. WMCSA '99. Second IEEE Workshop on, pp.
90-100, 1999.
[27] P. Papadimitratos, Z. J. Haas, “Secure routing for mobile ad hoc
networks”, SCS Communication Networks and Distributed
Systems Modeling and Simulation Conference (CNDS 2002),
pp. 01.27-31, 2002.
[28] K. Sanzgiri, B. Dahill, B. N. Levinevd., “A secure routing
protocol for ad hoc networks”, Network Protocols, 2002.
Proceedings. 10th IEEE International Conference on, pp. 78-
87, 2002.
[29] M. G. Zapata, N. Asokan, “Securing ad hoc routing protocols”,
3rd ACM workshop on Wireless security, pp. 1-10, 2002.
[30] P. Papadimitratos, Z. J. Haas, “Secure Link State Routing for
Mobile Ad Hoc Networks”, 2003 International Symposium on
Applications and the Internet, pp., 2003.
[31] J. Nie, J. Wen, J. Luovd., “An adaptive fuzzy logic based secure
routing protocol in mobile ad hoc networks,” Fuzzy Sets and
Systems, vol. 157, no. 12, pp. 1704-1712, 2006.

Thank you for copying data from http://www.arastirmax.com