Understanding BGP misconfiguration
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
BGP routing stability of popular destinations
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Efficient Multicast Packet Authentication Using Signature Amortization
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Visualization of wormholes in sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Short Signatures from the Weil Pairing
Journal of Cryptology
Aggregated path authentication for efficient BGP security
Proceedings of the 12th ACM conference on Computer and communications security
Proceedings of the 14th ACM conference on Computer and communications security
One-Way Signature Chaining: a new paradigm for group cryptosystems
International Journal of Information and Computer Security
Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks
IEEE Transactions on Wireless Communications
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Wormhole attacks in wireless networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Wireless routing protocols allow transmitting nodes to have some knowledge of the topology in order to decide when to forward a packet (via broadcast) and when to drop it. Since a routing protocol forms the backbone of any network, it is a lucrative target for attacks. Routing protocols for wired networks (such as S-BGP) are not scalable in an ad-hoc wireless environment because of two main drawbacks: (1) the need to maintain knowledge about all immediate neighbors (which requires a discovery protocol), and (2) the need to transmit the same update several times, one for each neighbor. Although information about neighbors is readily available in a fairly static and wired network, such information is often not updated or available in an ad-hoc wireless network with mobile devices. Consequently, S-BGP is not suitable for such scenarios. We propose a BGP-type wireless routing protocol for such networks that does not suffer from such drawbacks. The protocol uses a novel authentication primitive called Enhanced Chain Signatures (ECS).