Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
BSMR: Byzantine-resilient secure multicast routing in multihop wireless networks
Curtmola R., Nita-Rotaru C. IEEE Transactions on Mobile Computing8 (4):445-459,2009.Type:Article
Date Reviewed: May 20 2009

This paper proposes a secure multicast routing protocol that deals with several Byzantine attacks, including black hole, wormhole, and flood rushing.

Curtmola and Nita-Rotaru exploit hash chain mechanisms “to prevent tree nodes from claiming to be at a smaller hop distance from the group leader than they actually are.” In addition, a route discovery algorithm, a multicast route activation algorithm, and a selective data forwarding mitigation strategy are proposed. Eventually, the simulation indicates the Byzantine-resillient secure multicast routing (BSMR) protocol that outperforms A-MAODV on attack resilience for black hole attacks, wormhole attacks, and protocol overhead.

This paper adopts several well-known wireless security schemes to secure multicast routing packets. For example, the authors apply TESLA to tackle the source authenticity of the received data, public key infrastructure (PKI) for certificate management on authorizing mobile nodes, and pairwise shared key scheme for tree neighbors.

The paper has, however, a few major defects.

First, in the authentication framework in Section 5.2, the paper never mentions the method by which mobile nodes obtain certificates or public/private keys from the system. If malicious nodes or former nodes with that information can officially join the multicast tree, they can perform Byzantine attacks. In wireless networks, in particular, mobile nodes are always changing. The authors presume that the group leader takes control of the certificate management and key agreement, and any authentication operations are performed before mobile nodes join the multicast tree; otherwise, several relevant security schemes applied in this paper lack a complete security framework and, thus, the readers only perceive portions of the security perspective.

Second, in hop count authentication, the paper adopts a hash chain function to verify the actual hop distance. The equation hmax-d = hmax(S), where hmax-d is the hop count authenticator, seems unreasonable. If so, S is a random number and the authenticator is a node’s ID. After performing the hash function several times, it is impossible for the equation to obtain the same result. If not, the paper should describe the detailed meaning of the hop count authenticator.

The third defect is in Sections 5.3, 5.4, and 5.5: if a malicious node periodically broadcasts a tree token, how does the system identify the actual token using f (tree token)? The malicious behavior will confuse the other members, since the signature and the private key encryption of the group leader don’t protect the token. Additionally, during the propagation of multicast activation (MACT) messages, in the case without a certificate authority (CA) server, tree neighbors cannot obtain the public key to establish a pairwise shared key.

Finally, the paper considers key agreement and certificate management and proposes a practical security multicast routing protocol. Too many security schemes are adopted and involved; the paper lacks a detailed presentation of how they work cooperatively.

In the future, the authors should try to emphasize the multicast routing aspect based on a CA server (group leader) with proper key agreement and certificate management, assuming they are already in place. They should focus on dealing with insider threats and malicious attacks. The paper should be resubmitted at a later stage of research.

Reviewer:  Hua-Yi Lin Review #: CR136855 (1001-0046)
Bookmark and Share
  Reviewer Selected
 
 
Security and Protection (C.2.0 ... )
 
 
Wireless Communication (C.2.1 ... )
 
 
Network Protocols (C.2.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy