Network and internetwork security: principles and practice
Network and internetwork security: principles and practice
GloMoSim: a library for parallel simulation of large-scale wireless networks
PADS '98 Proceedings of the twelfth workshop on Parallel and distributed simulation
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Communications of the ACM
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
The Small-World Phenomenon: An Algorithmic Perspective
The Small-World Phenomenon: An Algorithmic Perspective
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
IEEE Network: The Magazine of Global Internetworking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Securing Mobile Ad hoc Networks — A Motivational Approach
BT Technology Journal
Proceedings of the 9th annual international conference on Mobile computing and networking
Quality of service in mobile ad hoc networks
The handbook of ad hoc wireless networks
Detection and prevention of MAC layer misbehavior in ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
An Adaptive and Predictive Security Model for Mobile Ad hoc Networks
Wireless Personal Communications: An International Journal
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Simulation of a distributed recommendation system for pervasive networks
Proceedings of the 2005 ACM symposium on Applied computing
Proceedings of the 11th annual international conference on Mobile computing and networking
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
LARS: a locally aware reputation system for mobile ad hoc networks
Proceedings of the 44th annual Southeast regional conference
A price-based reliable routing game in wireless networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Secure incentives for commercial ad dissemination in vehicular networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Towards digital video steganalysis using asymptotic memoryless detection
Proceedings of the 9th workshop on Multimedia & security
On improving the efficiency of truthful routing in MANETs with selfish nodes
Pervasive and Mobile Computing
Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network
Computer Communications
The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes
IEEE Transactions on Mobile Computing
Cryptographic Versus Trust-based Methods for MANET Routing Security
Electronic Notes in Theoretical Computer Science (ENTCS)
Truthful multipath routing for ad hoc networks with selfish nodes
Journal of Parallel and Distributed Computing
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Incentive-compatible opportunistic routing for wireless networks
Proceedings of the 14th ACM international conference on Mobile computing and networking
Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network
Computational Intelligence and Security
A grammatical evolution approach to intrusion detection on mobile ad hoc networks
Proceedings of the second ACM conference on Wireless network security
A light-weight scalable truthful routing protocol in MANETs with selfish nodes
International Journal of Ad Hoc and Ubiquitous Computing
DynamicTrust: three-dimensional dynamic computing model of trust in peer-to-peer networks
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation
CSR: Constrained Selfish Routing in Ad-Hoc Networks
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Mitigating routing vulnerabilities in ad hoc networks using reputations
International Journal of Information and Computer Security
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
Controlling resource hogs in mobile delay-tolerant networks
Computer Communications
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
CIIT '07 The Sixth IASTED International Conference on Communications, Internet, and Information Technology
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
CIIT '07 The Sixth IASTED International Conference on Communications, Internet, and Information Technology
Association between nodes to combat blackhole attack in DSR based MANET
WOCN'09 Proceedings of the Sixth international conference on Wireless and Optical Communications Networks
A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
A dynamic intrusion detection hierarchy for MANETs
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Security enforcement in wireless sensor networks: A framework based on non-cooperative games
Pervasive and Mobile Computing
Tailored trustworthiness estimations in Peer-to-Peer networks
International Journal of Internet Technology and Secured Transactions
A collusion-resistant routing scheme for noncooperative wireless ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Detecting greedy behaviors by linear regression in wireless ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Game-theoretic approach for improving cooperation in wireless multihop networks
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
A cross-layer route discovery strategy for virtual currency systems in mobile ad hoc networks
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
Rating the raters: a reputation system for wiki-like domains
Proceedings of the 3rd international conference on Security of information and networks
The design of a reliable reputation system
Electronic Commerce Research
An optimal, strategy-proof scheme for multi-path traffic assignment in non-cooperative networks
IEEE Transactions on Wireless Communications
Vehicular networks and the future of the mobile internet
Computer Networks: The International Journal of Computer and Telecommunications Networking
Adversarial security: getting to the root of the problem
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
Journal of Network and Computer Applications
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Self-monitoring security in ad hoc routing
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
LSTOP: a light-weight scalable truthful routing protocol in MANETs with selfish nodes
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Security for interactions in pervasive networks: applicability of recommendation systems
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Advanced detection of selfish or malicious nodes in ad hoc networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Locally multipath adaptive routing protocol resilient to selfishness and wormholes
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
MoteAODV – an AODV implementation for TinyOS 2.0
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
On broadcast encryption with random key pre-distribution schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
A forwarding spurring protocol for multihop ad hoc networks (FURIES)
NEW2AN'07 Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking
Trust assurance levels of cybercars in v2x communication
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
Hi-index | 0.00 |
Devices in mobile ad hoc networks work as network nodes and relay packets originated by other nodes. Mobile ad hoc networks can work properly only if the participating nodes cooperate in routing and forwarding. For individual nodes it might be advantageous not to cooperate, though. The new routing protocol extensions presented in this paper make it possible to detect and isolate misbehaving nodes, thus making it unattractive to deny cooperation. In the presented scheme, trust relationships and routing decisions are made based on experienced, observed, or reported routing and forwarding behavior of other nodes. A hybrid scheme of selective altruism and utilitarianism is presented to strengthen mobile ad hoc network protocols in their resistance to security attacks, while aiming at keeping network throughput, or goodput, high. This paper focuses particularly on the network layer, using the Dynamic Source Routing (DSR) protocol as an example.