Password authentication with insecure communication
Communications of the ACM
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Towards provable security for ad hoc routing protocols
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Performance Comparison of Trust-Based Reactive Routing Protocols
IEEE Transactions on Mobile Computing
Key management and delayed verification for ad hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
A new security scheme for on-demand source routing in mobile ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Distributed intrusion detection models for mobile ad hoc networks
Distributed intrusion detection models for mobile ad hoc networks
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
ADHOC-NOW '08 Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks
Robust random number generation for peer-to-peer systems
Theoretical Computer Science
BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks
IEEE Transactions on Mobile Computing
On the Security of Route Discovery in MANETs
IEEE Transactions on Mobile Computing
Security and Quality of Service in Ad Hoc Wireless Networks
Security and Quality of Service in Ad Hoc Wireless Networks
Path hopping based on reverse AODV for security
APNOMS'06 Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services
An EFSM-based intrusion detection system for ad hoc networks
ATVA'05 Proceedings of the Third international conference on Automated Technology for Verification and Analysis
Securing AODV: the A-SAODV secure routing prototype
IEEE Communications Magazine
Secure scheme against data dropping
Proceedings of the 16th Communications & Networking Symposium
Hi-index | 0.00 |
Presently, the main concern of ad hoc routing protocols is no longer to find an optimal route to a given destination but to find the safe route free from malicious attackers. Several secure ad hoc routing protocols proposed, in the literature, are based on public key cryptography which drawback is to consume much more resources and decrease consequently network performances. In this paper, we propose a secure routing scheme for the DSR protocol. The proposed scheme combines the hash chains and digital signatures to provide a high level of security while reducing the costs of hop-by-hop signature generation and verification. The proposed protocol is analyzed using the NS-2 simulator.