Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Partitioning Avoidance in Mobile Ad Hoc Networks Using Network Survivability Concepts
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
On-Demand Multi Path Distance Vector Routing in Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks
AINA '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications
Hi-index | 0.00 |
In hostile Ad hoc network, the possibility of being attacked or attacking others can't be avoided. Most current intrusion detection systems and secure routing protocols only focus on concrete attacking behaviors while neglecting the underlying attacking threat. So it's inevitable to choose malicious nodes during routing establishment. To construct a secure multipath route, we present SEMAP, a secure enhancement mechanism based on Attacking Point (AP) which converts the possibility of security threat to a concrete metric. AP is a description of security status of a node. AP of a node can be easily extended to that of link, path and path set, which provides an important reference in route selection. Our design can exclude the nodes that will be the objects of adversaries from the network before actual routing process. Simulation results show that SEMAP provides an effective security enhancement without compromising the efficiency of original routing protocol.