GloMoSim: a library for parallel simulation of large-scale wireless networks
PADS '98 Proceedings of the twelfth workshop on Parallel and distributed simulation
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
Towards provable security for ad hoc routing protocols
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Struggling against selfishness and black hole attacks in MANETs
Wireless Communications & Mobile Computing
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
A survey of security visualization for computer network logs
Security and Communication Networks
Security and Communication Networks
Error analysis of range-based localisation algorithms in wireless sensor networks
International Journal of Sensor Networks
Hi-index | 0.00 |
A new solution to enforce ENDAIRA against black-hole attacks is proposed in this paper. In black-hole attack the misbehaving node simply drops packets of the victim, supposed to be routed or forwarded by it. The proposal is a hybrid solution that considers both directed and broadcast control packets. It combines two different approaches, two-hop-ACK and the watchdog, to building a combined solution able to deal with both directed and broadcast packets. The main contribution is considering control packets, contrary to the current literature in the context of selfish nodes, where solutions only consider data packets. The proposed solution was used to enforce ENDAIRA, one of the most secure protocols. It enhances its security with respect to packet dropping. The solution was analysed and evaluated through an extensive simulation study.