Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Password authentication with insecure communication
Communications of the ACM
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Black hole attack in mobile Ad Hoc networks
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Robust random number generation for peer-to-peer systems
Theoretical Computer Science
Advanced detection of selfish or malicious nodes in ad hoc networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Random feedbacks for selfish nodes detection in mobile ad hoc networks
IPOM'05 Proceedings of the 5th IEEE international conference on Operations and Management in IP-Based Networks
New directions in cryptography
IEEE Transactions on Information Theory
Hash chains at the basis of a secure reactive routing protocol
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Hi-index | 0.00 |
In Mobile Ad hoc networks energy is a critical resource, highly consumed by routing functions. In order to preserve it, nodes may decide not to participate in forwarding others' packets and drop them. Isolating these nodes is an efficient solution to decrease packet's loss. We propose in this paper a new secure protocol to monitor, detect, and safely isolate such misbehaving nodes. The proposed solution is based on the Probing technique. It also uses hash chains and Diffie-Hellman protocol to authenticate the nodes during data exchange. The secure protocol is analyzed using the NS-2 simulator.