On the fairness of flow aggregation for denial-of-service resistant QoS in MANETs
QShine '06 Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
Reporter node determination of replicated node detection in wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Proceedings of the 4th Annual International Conference on Wireless Internet
A trust model based on fuzzy recommendation for mobile ad-hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Network stack diagnosis and visualization tool
Proceedings of the Symposium on Computer Human Interaction for the Management of Information Technology
Adaptable misbehavior detection and isolation in wireless ad hoc networks using policies
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Distributed dynamic protection of services on ad hoc and peer to peer networks
IPOM'07 Proceedings of the 7th IEEE international conference on IP operations and management
Formation coordination for self-mobile localization: framework
CIRA'09 Proceedings of the 8th IEEE international conference on Computational intelligence in robotics and automation
Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
An Experimental Study of the Performance Impact of Path-Based DoS Attacks in Wireless Mesh Networks
Mobile Networks and Applications
International Journal of Communication Networks and Distributed Systems
Efficient certification path discovery for MANET
EURASIP Journal on Wireless Communications and Networking
OREN: Optimal revocations in ephemeral networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
ETUS: enhanced triple umpiring system for security and robustness of wireless mobile ad hoc networks
International Journal of Communication Networks and Distributed Systems
International Journal of Network Management
A distributed intrusion detection scheme for wireless ad hoc networks
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Security model for emergency real-time communications in autonomous networks
Information Systems Frontiers
Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks
International Journal of Business Data Communications and Networking
An event-based packet dropping detection scheme for wireless mesh networks
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks
Mobile Networks and Applications
Hi-index | 0.07 |
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper, we describe SCAN, a unified network-layer security solution for such networks that protects both routing and data forwarding operations through the same reactive approach. SCAN does not apply any cryptographic primitives on the routing messages. Instead, it protects the network by detecting and reacting to the malicious nodes. In SCAN, local neighboring nodes collaboratively monitor each other and sustain each other, while no single node is superior to the others. SCAN also adopts a novel credit strategy to decrease its overhead as time evolves. In essence, SCAN exploits localized collaboration and information cross-validation to protect the network in a self-organized manner. Through both analysis and simulation results, we demonstrate the effectiveness of SCAN even in a highly mobile and hostile environment.