MACAW: a media access protocol for wireless LAN's
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
A distance routing effect algorithm for mobility (DREAM)
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Query localization techniques for on-demand routing protocols in ad hoc networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Security for Wireless Ad--hoc Networks
Security for Wireless Ad--hoc Networks
Salvaging route reply for on-demand routing protocols in mobile ad-hoc networks
MSWiM '05 Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
EURASIP Journal on Wireless Communications and Networking
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges
ICSNC '07 Proceedings of the Second International Conference on Systems and Networks Communications
Ad Hoc Networks Security Mechanism Based on CPK
CISW '07 Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops
An Ontological Approach to Secure MANET Management
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Computer Security: Principles and Practice
Computer Security: Principles and Practice
Robust and secure routing scheme for wireless multihop network
Personal and Ubiquitous Computing
IEEE Transactions on Information Forensics and Security
Security and Quality of Service in Ad Hoc Wireless Networks
Security and Quality of Service in Ad Hoc Wireless Networks
SCAN: self-organized network-layer security in mobile ad hoc networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Ad hoc wireless networks provide mobile communication capability to satisfy a need of a temporary nature and without the existence of any well-defined infrastructure. Protecting the network layer from malicious attacks is an important and challenging issue in both wired and wireless networks and the issue becomes even more challenging in the case of wireless mobile ad hoc network. In this paper, we propose a solution of triple umpiring system (TUS) that provides security for routing and data forwarding operations. In our system, each node's behaviour from source to destination is closely monitored by a set of three umpires. If any misbehaviour is noticed, umpires flag off the guilty node from the circuit. We have proposed two enhancements to the basic TUS for salvaging the circuit during disruptions in route reply and data forwarding phases. The model with these two enhancements is called ETUS. We have implemented TUS and ETUS by modifying the prominent AODV protocol. Extensive investigation studies using QualNet 5.0.2 establish the soundness and robustness of the proposal.