Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
The official PGP user's guide
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Toward self-organized mobile ad hoc networks: the terminodes project
IEEE Communications Magazine
Self organization in mobile ad hoc networks: the approach of Terminodes
IEEE Communications Magazine
Spontaneous networking: an application oriented approach to ad hoc networking
IEEE Communications Magazine
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
Key agreement in ad hoc networks
Computer Communications
IEEE Network: The Magazine of Global Internetworking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
SPINS: security protocols for sensor networks
Wireless Networks
Towards flexible credential verification in mobile ad-hoc networks
Proceedings of the second ACM international workshop on Principles of mobile computing
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Secure traceroute to detect faulty or malicious routing
ACM SIGCOMM Computer Communication Review
PAN: providing reliable storage in mobile ad hoc networks with probabilistic quorum systems
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Small worlds in security systems: an analysis of the PGP certificate graph
Proceedings of the 2002 workshop on New security paradigms
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Report on a working session on security in wireless ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Fast authenticated key establishment protocols for self-organizing sensor networks
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Kerberos assisted Authentication in Mobile Ad-hoc Networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Towards a new paradigm for securing wireless sensor networks
Proceedings of the 2003 workshop on New security paradigms
A certificate revocation scheme for wireless ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Secure long term communities in ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Quality of service in mobile ad hoc networks
The handbook of ad hoc wireless networks
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
Security issues in ad hoc networks
The handbook of ad hoc wireless networks
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Integrating heterogeneous wireless technologies: a cellular aided mobile Ad Hoc network (CAMA)
Mobile Networks and Applications
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Peer-to-Peer Security in Mobile Devices: A User Perspective
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments
Wireless Personal Communications: An International Journal
An Adaptive and Predictive Security Model for Mobile Ad hoc Networks
Wireless Personal Communications: An International Journal
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mobile Phones as Computing Devices: The Viruses are Coming!
IEEE Pervasive Computing
Information Assurance In Wireless Sensor Networks
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Preventing Impersonation Attacks in MANET with Multi-Factor Authentication
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Contact networking: a localized mobility system
Proceedings of the 1st international conference on Mobile systems, applications and services
Wireless mesh networks: a survey
Computer Networks and ISDN Systems
Hotspot-based traceback for mobile ad hoc networks
Proceedings of the 4th ACM workshop on Wireless security
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
A new approach for establishing pairwise keys for securing wireless sensor networks
Proceedings of the 3rd international conference on Embedded networked sensor systems
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
Trust Establishment In Pure Ad-hoc Networks
Wireless Personal Communications: An International Journal
The Green Card Protocol: An Identification Protocol for Decentralized Systems
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Discrete Applied Mathematics
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Toward Secure Low Rate Wireless Personal Area Networks
IEEE Transactions on Mobile Computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
A comprehensive service discovery solution for mobile ad hoc networks
Mobile Networks and Applications
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
A game-theoretic study of CSMA/CA under a backoff attack
IEEE/ACM Transactions on Networking (TON)
Identity-based secure collaboration in wireless ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks
Computer Communications
Optimal Dispersal of Certificate Chains
IEEE Transactions on Parallel and Distributed Systems
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
IEEE Transactions on Mobile Computing
Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol
Wireless Personal Communications: An International Journal
SecLEACH-On the security of clustered sensor networks
Signal Processing
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
Computer Communications
Performance evaluation and comparison of different ad hoc routing protocols
Computer Communications
A formal model of rational exchange and its application to the analysis of Syverson's protocol
Journal of Computer Security - Special issue on CSFW15
A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Sahnet: a secure system for ad-hoc networking using ecc
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Verifying Delivered QoS in Multihop Wireless Networks
IEEE Transactions on Mobile Computing
Secure content access and replication in pure P2P networks
Computer Communications
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Analysis of routing security-energy trade-offs in wireless sensor networks
International Journal of Security and Networks
Vulnerability analysis of certificate graphs
International Journal of Security and Networks
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
Trusting the Trust-Model in mobile wireless ad-hoc network settings
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Security association in mobile ad hoc networks through self-organized public key certification
AMCOS'05 Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
Anonymous Routing for Mobile Wireless Ad Hoc Networks
International Journal of Distributed Sensor Networks - Heterogenous Wireless Ad Hoc and Sensor Networks
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
ACM Transactions on Information and System Security (TISSEC)
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
A unified security framework with three key management schemes for wireless sensor networks
Computer Communications
Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments
International Journal of Advanced Media and Communication
Journal of Systems Architecture: the EUROMICRO Journal
Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme
Journal of Computer Science and Technology
COCOON '09 Proceedings of the 15th Annual International Conference on Computing and Combinatorics
PKIX Certificate Status in Hybrid MANETs
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Group key management scheme for large-scale sensor networks
Ad Hoc Networks
Secret instantiation in ad-hoc networks
Computer Communications
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
d-key dynamic encryption: a security enhancement protocol for mobile ad hoc network
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
COFFEE: a context-free protocol for stimulating data forwarding in wireless ad hoc networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
An algebraic watchdog for wireless network coding
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Discrete Applied Mathematics
A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
Distributed authentication for services commercialization in ad hoc networks
Mobility '09 Proceedings of the 6th International Conference on Mobile Technology, Application & Systems
OMH--Suppressing Selfish Behavior in Ad hoc Networks with One More Hop
Mobile Networks and Applications
REDMAN: An optimistic replication middleware for read-only resources in dense MANETs
Pervasive and Mobile Computing
CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS
Computer Networks: The International Journal of Computer and Telecommunications Networking
Trust propagation in small worlds
iTrust'03 Proceedings of the 1st international conference on Trust management
A global authentication scheme for mobile ad-hoc networks
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
An efficient certificate authority for ad hoc networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
A key management scheme combined with intrusion detection for mobile ad hoc networks
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
Location-aided secure routing scheme in mobile ad hoc networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Supporting mobility in GKM over ad-hoc network using a decentralized and spontaneous algorithm
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Algorithms for sensor and ad hoc networks: advanced lectures
Algorithms for sensor and ad hoc networks: advanced lectures
Approximability and inapproximability of the minimum certificate dispersal problem
Theoretical Computer Science
Revising centralized certificate validation standards for mobile and wireless communications
Computer Standards & Interfaces
A new mechanism to detect selfish behavior in IEEE 802.11 ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Hybrid trust and reputation management for sensor networks
Wireless Networks
A self-organized mechanism for thwarting malicious access in ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
A formal study of trust-based routing in wireless ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
CLUSMA: a mobile agent based clustering middleware for wireless sensor networks
Proceedings of the 7th International Conference on Frontiers of Information Technology
Secure self-adaptive framework for distributed smart home sensor network
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
International Journal of Communication Networks and Distributed Systems
Demand-driven publish/subscribe in mobile environments
Wireless Networks
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks
Efficient certification path discovery for MANET
EURASIP Journal on Wireless Communications and Networking
Secure routing in ad hoc networks and a related intrusion detection problem
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Shared RSA key generation in a mobile ad hoc network
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Self-generated-certificate public key encryption without pairing and its application
Information Sciences: an International Journal
ETUS: enhanced triple umpiring system for security and robustness of wireless mobile ad hoc networks
International Journal of Communication Networks and Distributed Systems
On the price of security in large-scale wireless ad hoc networks
IEEE/ACM Transactions on Networking (TON)
ACS'11 Proceedings of the 11th WSEAS international conference on Applied computer science
Trust establishment in ad hoc and sensor networks
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Secure data transmission on multiple paths in mobile ad hoc networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Hybrid authentication and key management scheme for WSANs
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Anonymous routing in wireless mobile ad hoc networks to prevent location disclosure attacks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Authenticated public key distribution scheme without trusted third party
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Distributed certificate authority under the GRID-Location aided routing protocol
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
A self-organized authentication architecture in mobile ad-hoc networks
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
A composite key management scheme for mobile ad hoc networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Peer collaboration in wireless ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Verifiable agreement: limits of non-repudiation in mobile peer-to-peer ad hoc networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
International Journal of Network Management
Charging support for ad hoc stub networks
Computer Communications
Minimum certificate dispersal with tree structures
TAMC'12 Proceedings of the 9th Annual international conference on Theory and Applications of Models of Computation
Self-organizing life cycle management of mobile ad hoc networks
Security and Communication Networks
A trust-centered approach for building e-voting systems
EGOV'07 Proceedings of the 6th international conference on Electronic Government
Defending against jamming attacks in wireless local area networks
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Secure local algorithm for establishing a virtual backbone in 3D ad hoc network
International Journal of Networking and Virtual Organisations
Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks
International Journal of Business Data Communications and Networking
Intrusion Detection Algorithm for MANET
International Journal of Information Security and Privacy
Safeguarding ad hoc networks with a self-organized membership control system
Computer Networks: The International Journal of Computer and Telecommunications Networking
Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
So far, research on mobile ad hoc networks has been forcused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an overview of security problems for mobile ad hoc networks, distinguishing the threats on basic mechanisms and on security mechanisms. It then describes our solution to protect the security mechanisms. The original features of this solution include that (i) it is fully decentralized and (ii) all nodes are assigned equivalent roles.