VARON: Vehicular Ad hoc Route Optimisation for NEMO
Computer Communications
Surviving attacks on disruption-tolerant networks without authentication
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
A secure incentive protocol for mobile ad hoc networks
Wireless Networks
An efficient session key generation for NTDR networks based on bilinear paring
Computer Communications
Energy Efficient Forwarding Scheme for Secure Wireless Ad Hoc Routing Protocols
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
An Observational Theory for Mobile Ad Hoc Networks (full version)
Information and Computation
Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme
Journal of Computer Science and Technology
Efficient key distribution scheme for secure routing in wireless mesh network environment
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
Robust and secure routing scheme for wireless multihop network
Personal and Ubiquitous Computing
d-key dynamic encryption: a security enhancement protocol for mobile ad hoc network
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
RAAM: routing algorithm using ant agents for MANETS
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Gateway Selection Protocol in Hybrid MANET Using DYMO Routing
Mobile Networks and Applications
A calculus for mobile ad hoc networks
COORDINATION'07 Proceedings of the 9th international conference on Coordination models and languages
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
IEEE Transactions on Wireless Communications
SReD: a secure reputation-based dynamic window scheme for disruption-tolerant networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
AOS: an anonymous overlay system for mobile ad hoc networks
Wireless Networks
Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
Trust-based minimum cost opportunistic routing for Ad hoc networks
Journal of Systems and Software
A secure on-demand routing with distributed authentication for trust-based ad hoc networks
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
Adversarial testing of wireless routing implementations
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Secure and robust multipath routings for advanced metering infrastructure
The Journal of Supercomputing
Hi-index | 0.07 |
Initial work in ad hoc routing has considered only the problem of providing efficient mechanisms for finding paths in very dynamic networks, without considering security. Because of this, there are a number of attacks that can be used to manipulate the routing in an ad hoc network. In this paper, we describe these threats, specifically showing their effects on ad hoc on-demand distance vector and dynamic source routing. Our protocol, named authenticated routing for ad hoc networks (ARAN), uses public-key cryptographic mechanisms to defeat all identified attacks. We detail how ARAN can secure routing in environments where nodes are authorized to participate but untrusted to cooperate, as well as environments where participants do not need to be authorized to participate. Through both simulation and experimentation with our publicly available implementation, we characterize and evaluate ARAN and show that it is able to effectively and efficiently discover secure routes within an ad hoc network.