A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Communications of the ACM
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Computer Networks
Transaction Processing in a Mobile, Multi-Database Environment
Multimedia Tools and Applications
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
A Performance Comparison of Energy Consumption for Mobile Ad Hoc Network Routing Protocols
MASCOTS '00 Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
ADHOC-NOW '08 Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks
Hi-index | 0.00 |
Ad hoc networks are useful in a variety of applications, particularly in areas where creating a network infrastructure is not cost effective or when timeliness is important, such as military or rescue operations. The sensitivity of these uses for ad hoc networks makes routing security an important consideration. Unlike traditional networks, in ad hoc networks each node participates in routing functions. A malicious node could introduce serious disruptions in the network by advertising false routing information or not participating in packet forwarding. We introduce modifications to the proposed AODV-S routing protocol to reduce energy consumption associated with the security solution. Both protocols are simulated and the performance is compared with AODV. These results are presented and analyzed. Additionally, the application of ad hoc networks and the proposed AODV-SMS protocol in an information sharing environment is discussed.