Wireless mesh networks: a survey
Computer Networks and ISDN Systems
Preventing the capture of sensitive information
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Cross-layer designs for mitigating range attacks in ad hoc networks
PDCN'06 Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks
A heterogeneous-network aided public-key management scheme for mobile ad hoc networks
International Journal of Network Management
A new security scheme for on-demand source routing in mobile ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Computer Communications
Performance optimization of region-based group key management in mobile ad hoc networks
Performance Evaluation
Secure routing protocol for mobile ad-hoc networks
Proceedings of the 2007 Summer Computer Simulation Conference
International Journal of Web and Grid Services
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
Symbiotic Networks: Towards a New Level of Cooperation Between Wireless Networks
Wireless Personal Communications: An International Journal
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
Computer Standards & Interfaces
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Revocation games in ephemeral networks
Proceedings of the 15th ACM conference on Computer and communications security
Dynamic Distributed Authentication Scheme for Wireless LAN-Based Mesh Networks
Information Networking. Towards Ubiquitous Networking and Services
Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship
Securing wireless mesh networks: a winning combination of routing and forwarding mechanisms
Proceedings of the 5th International Latin American Networking Conference
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
IEEE Transactions on Wireless Communications
Securing resource-constrained wireless ad hoc networks
IEEE Wireless Communications
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
CIIT '07 The Sixth IASTED International Conference on Communications, Internet, and Information Technology
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
CIIT '07 The Sixth IASTED International Conference on Communications, Internet, and Information Technology
Survivable keying for wireless ad hoc networks
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
WOCN'09 Proceedings of the Sixth international conference on Wireless and Optical Communications Networks
A new collision-free pseudonym scheme in mobile ad hoc networks
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless physical layer security
Secured macro/micro-mobility protocol for multi-hop cellular IP
Pervasive and Mobile Computing
Security analysis of TORA routing protocol
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
On the Use of Ad Hoc Cooperation for Seamless Vertical Handoff and Its Performance Evaluation
Mobile Networks and Applications
Group-based key management for mobile sensor networks
Sarnoff'10 Proceedings of the 33rd IEEE conference on Sarnoff
Anomaly detection and mitigation for disaster area networks
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Assessing the vulnerability of replicated network services
Proceedings of the 6th International COnference
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Journal of Network and Computer Applications
Black-hole attacks in P2P mobile networks discovered through Bayesian filters
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems
OREN: Optimal revocations in ephemeral networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the anomaly intrusion-detection in mobile ad hoc network environments
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Secure data transmission on multiple paths in mobile ad hoc networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Multistage authentication scheme for mobile ad-hoc network using clustering mechanism
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
A security enhanced AODV routing protocol
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
A sophisticated solution for revealing attacks on wireless LAN
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
An efficient scheme for detecting malicious nodes in mobile ad hoc networks
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
International Journal of Network Management
Review: Security threats and solutions in MANETs: A case study using AODV and SAODV
Journal of Network and Computer Applications
Security and Communication Networks
Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
A secure on-demand source routing scheme using hierarchical clustering in mobile ad hoc networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Enhancing performance of AODV against Black hole Attack
Proceedings of the CUBE International Information Technology Conference
International Journal of Business Data Communications and Networking
International Journal of Ad Hoc and Ubiquitous Computing
On effective sampling techniques in host-based intrusion detection in tactical MANET
International Journal of Security and Networks
On effective data aggregation techniques in host-based intrusion detection in MANET
International Journal of Security and Networks
Journal of Computer and System Sciences
Hi-index | 0.00 |
Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wireline networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, and highly dynamic network topology. These challenges clearly make a case for building multifence security solutions that achieve both broad protection and desirable network performance. In this article we focus on the fundamental security problem of protecting the multihop network connectivity between mobile nodes in a MANET. We identify the security issues related to this problem, discuss the challenges to security design, and review the state-of-the-art security proposals that protect the MANET link- and network-layer operations of delivering packets over the multihop wireless channel. The complete security solution should span both layers, and encompass all three security components of prevention, detection, and reaction.