A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Comparison of broadcasting techniques for mobile ad hoc networks
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Survivable mobile wireless networks: issues, challenges, and research directions
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Failure Detectors for Large-Scale Distributed Systems
SRDS '02 Proceedings of the 21st IEEE Symposium on Reliable Distributed Systems
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Localized techniques for broadcasting in wireless sensor networks
Proceedings of the 2004 joint workshop on Foundations of mobile computing
Location-aware key management scheme for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks
IEEE Transactions on Dependable and Secure Computing
Spatial Node Distribution of the Random Waypoint Mobility Model with Applications
IEEE Transactions on Mobile Computing
Social network analysis for routing in disconnected delay-tolerant MANETs
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Mind your manners: socially appropriate wireless key establishment for groups
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
The diameter of opportunistic mobile networks
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks
WWIC 2009 Proceedings of the 7th International Conference on Wired/Wireless Internet Communications
Self-monitoring of wireless sensor networks
Computer Communications
Mobility and cooperation to thwart node capture attacks in MANETs
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
RECAST: telling apart social and random relationships in dynamic networks
Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems
Hi-index | 0.00 |
Mobile Ad Hoc networks, due to the unattended nature of the network itself and the dispersed location of nodes, are subject to several unique security issues. One of the most vexed security threat is node capture. A few solutions have already been proposed to address this problem; however, those solutions are either centralized or focused on theoretical mobility models alone. In the former case the solution does not fit well the distributed nature of the network while, in the latter case, the quality of the solutions obtained for realistic mobility models severely differs from the results obtained for theoretical models. The rationale of this paper is inspired by the observation that re-encounters of mobile nodes do elicit a form of social ties. Leveraging these ties, it is possible to design efficient and distributed algorithms that, with a moderated degree of node cooperation, enforce the emergent property of node capture detection. In particular, in this paper we provide a proof of concept proposing a set of algorithms that leverage, to different extent, node mobility and node cooperation - that is, identifying social ties - to thwart node capture attack. In particular, we test these algorithms on a realistic mobility scenario. Extensive simulations show the quality of the proposed solutions and, more important, the viability of the proposed approach.