Misbehavior resilient multi-path data transmission in mobile ad-hoc networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
A practical secure neighbor verification protocol for wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Prevention of flooding attacks in mobile ad hoc networks
Proceedings of the International Conference on Advances in Computing, Communication and Control
Securing wireless mesh networks: a winning combination of routing and forwarding mechanisms
Proceedings of the 5th International Latin American Networking Conference
On multipath routing in multihop wireless networks: security, performance, and their tradeoff
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Secure framework for multipath multimedia streaming over wireless ad hoc network
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Enhancing data security in ad hoc networks based on multipath routing
Journal of Parallel and Distributed Computing
Secure framework for voice transmission over multipath wireless ad-hoc network
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Castor: scalable secure routing for ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Resilient Security Mechanism for Wireless Ad hoc Network
Wireless Personal Communications: An International Journal
A 2-dimensional approach to QoS provisioning in adversarial mobile ad hoc network environments
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Cooperative secret delivery in wireless sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.07 |
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectively cope with arbitrary malicious disruption of data transmissions, we propose and evaluate the secure message transmission (SMT) protocol and its alternative, the secure single-path (SSP) protocol. Among the salient features of SMT and SSP is their ability to operate solely in an end-to-end manner and without restrictive assumptions on the network trust and security associations. As a result, the protocols are applicable to a wide range of network architectures. We demonstrate that highly reliable communication can be sustained with small delay and small delay variability, even when a substantial portion of the network nodes systematically or intermittently disrupt communication. SMT and SSP robustly detect transmission failures and continuously configure their operation to avoid and tolerate data loss, and to ensure the availability of communication. This is achieved at the expense of moderate transmission and routing overhead, which can be traded off for delay. Overall, the ability of the protocols to mitigate both malicious and benign faults allows fast and reliable data transport even in highly adverse network environments.