Communications of the ACM
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
A brief overview of ad hoc networks: challenges and directions
IEEE Communications Magazine - Part Anniversary
Routing security in wireless ad hoc networks
IEEE Communications Magazine
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
An ad hoc Network is a new generation of network offering unrestricted mobility without any underlying infrastructure. In this kind of network, all the nodes share the responsibility of network formation and management. Fundamental characteristics of an ad hoc network, such as open medium, dynamic topology, dynamic cooperation and constrained capabilities lead to vulnerabilities. Unlike wired network, an ad hoc network does not have a clear line of defense, and every node must be prepared for encounters with an adversary. This paper proposes a three-layer security architecture for ad hoc networks, that provides self-organized distributed security, and authenticated, security aware routing. The first layer in the design performs the operation of a certification server such as issuing, renewal and revocation of certificate using the principle of secret sharing and threshold cryptography. Each certificate issued by this layer has a certain period of validity. Nodes should renew their tokens before expiration. Each node also accumulates its credit whenever it renews the token. The second layer provides authenticated and security aware routing using the token issued by the layer 1. Layer 3 consists of a modified version of reverse labeling restriction protocol that effectively handles internal attacks. This model has been simulated and is found to provide security with negligible overhead.