Securing the Scalable Source Routing Protocol
The Scalable Source Routing (SSR) protocol combines overlay-like routing in a virtual network structure with source routing in the physical network to a single cross-layer architecture. Thereby, it can provide indirect routing in networks that lack a well-crafted structure. SSR is well suited for mo...
Main Authors: | , , |
---|---|
Format: | Conference item |
Published: |
2015
|
_version_ | 1797063067725463552 |
---|---|
author | Kutzner, K Wallenta, C Fuhrmann, T |
author_facet | Kutzner, K Wallenta, C Fuhrmann, T |
author_sort | Kutzner, K |
collection | OXFORD |
description | The Scalable Source Routing (SSR) protocol combines overlay-like routing in a virtual network structure with source routing in the physical network to a single cross-layer architecture. Thereby, it can provide indirect routing in networks that lack a well-crafted structure. SSR is well suited for mobile ad hoc networks, sensor-actuator networks, and especially for mesh networks. Moreover, SSR directly provides the routing semantics of a structured routing overlay, making it an efficient basis for the scalable implementation of fully decentralized applications. In this paper we analyze SSR with regard to security: We show where SSR is prone to attacks, and we describe protocol modifications that make SSR robust in the presence of malicious nodes. The core idea is to introduce cryptographic certificates that allow nodes to discover forged protocol messages. We evaluate our proposed modifications by means of simulations, and thus demonstrate that they are both effective and efficient. |
first_indexed | 2024-03-06T20:54:34Z |
format | Conference item |
id | oxford-uuid:38bde034-ff7f-4442-b74f-71fd3d800e76 |
institution | University of Oxford |
last_indexed | 2024-03-06T20:54:34Z |
publishDate | 2015 |
record_format | dspace |
spelling | oxford-uuid:38bde034-ff7f-4442-b74f-71fd3d800e762022-03-26T13:51:49ZSecuring the Scalable Source Routing ProtocolConference itemhttp://purl.org/coar/resource_type/c_5794uuid:38bde034-ff7f-4442-b74f-71fd3d800e76Department of Computer Science2015Kutzner, KWallenta, CFuhrmann, TThe Scalable Source Routing (SSR) protocol combines overlay-like routing in a virtual network structure with source routing in the physical network to a single cross-layer architecture. Thereby, it can provide indirect routing in networks that lack a well-crafted structure. SSR is well suited for mobile ad hoc networks, sensor-actuator networks, and especially for mesh networks. Moreover, SSR directly provides the routing semantics of a structured routing overlay, making it an efficient basis for the scalable implementation of fully decentralized applications. In this paper we analyze SSR with regard to security: We show where SSR is prone to attacks, and we describe protocol modifications that make SSR robust in the presence of malicious nodes. The core idea is to introduce cryptographic certificates that allow nodes to discover forged protocol messages. We evaluate our proposed modifications by means of simulations, and thus demonstrate that they are both effective and efficient. |
spellingShingle | Kutzner, K Wallenta, C Fuhrmann, T Securing the Scalable Source Routing Protocol |
title | Securing the Scalable Source Routing Protocol |
title_full | Securing the Scalable Source Routing Protocol |
title_fullStr | Securing the Scalable Source Routing Protocol |
title_full_unstemmed | Securing the Scalable Source Routing Protocol |
title_short | Securing the Scalable Source Routing Protocol |
title_sort | securing the scalable source routing protocol |
work_keys_str_mv | AT kutznerk securingthescalablesourceroutingprotocol AT wallentac securingthescalablesourceroutingprotocol AT fuhrmannt securingthescalablesourceroutingprotocol |