A distance routing effect algorithm for mobility (DREAM)
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Salvaging route reply for on-demand routing protocols in mobile ad-hoc networks
MSWiM '05 Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
Certification and Revocation Schemes in Ad Hoc Networks Survey and Challenges
ICSNC '07 Proceedings of the Second International Conference on Systems and Networks Communications
Ad Hoc Networks Security Mechanism Based on CPK
CISW '07 Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops
Introduction: Special issue: Resource management and routing in wireless mesh networks
Computer Communications
SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack
CIS '09 Proceedings of the 2009 International Conference on Computational Intelligence and Security - Volume 02
A mobility management scheme for wireless mesh networks based on a hybrid routing protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
SCAN: self-organized network-layer security in mobile ad hoc networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
A mobile ad hoc network is a self-created, self-organized and self-administering set of nodes connected via wireless links without the aid of any fixed infrastructure or administrator. Protecting the network layer from malicious attacks is an important and challenging issue in both wired and wireless networks and the issue becomes even more challenging in the case of wireless mobile ad hoc networks. In this paper we propose a solution using a triple umpiring system (TUS), which provides security for routing and data-forwarding operations. In our system each node's behaviour from source to destination is closely monitored by a set of three umpires. If any misbehaviour is noticed, umpires flag off the guilty node from the circuit. We have proposed two enhancements to the basic TUS for salvaging the circuit during disruptions in route reply and data-forwarding phases. The model with these two enhancements is called ETUS. We have implemented TUS and ETUS by modifying the popular Ad hoc On-Demand Distance Vector protocol. Extensive simulation studies using QualNet 5.0 establish the soundness of the proposal. Copyright © 2010 John Wiley & Sons, Ltd.