Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Multicast operation of the ad-hoc on-demand distance vector routing protocol
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
KHIP—a scalable protocol for secure multicast routing
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Ad Hoc Wireless Networks: Protocols and Systems
Ad Hoc Wireless Networks: Protocols and Systems
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Secure multicast in wireless networks of mobile hosts: protocols and issues
Mobile Networks and Applications
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Hi-index | 0.00 |
Ad hoc networks are useful in many application areas. Security is important but it is a challenging issue due to ad hoc network’s characteristics such as lack of infrastructure, communication over wireless medium, and node mobility. In this paper we present a secure multicast routing protocol for ad hoc networks. The proposed protocol makes it possible for a node to create a new multicast group and join or leave an existing group securely. It also includes a mechanism for detecting and repairing broken links securely. In addition to securely exchanging multicast packets, this paper addresses the problem of securely building and maintaining multicast trees in ad hoc networks. Moreover, the protocol guards against attacks from authorized but misbehaving nodes as well as unauthorized nodes.