Network and internetwork security: principles and practice
Network and internetwork security: principles and practice
An analysis of security incidents on the Internet 1989-1995
An analysis of security incidents on the Internet 1989-1995
Location-aided routing (LAR) in mobile ad hoc networks
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Secure sensor networks for perimeter protection
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Wireless sensor networks
Sinkhole Intrusion Indicators in DSR MANETs
BROADNETS '04 Proceedings of the First International Conference on Broadband Networks
Link Layer Security for SAHN Protocols
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Key distribution and update for secure inter-group multicast communication
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Entrapping Adversaries for Source Protection in Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
TARP: trust-aware routing protocol
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Toward Secure Low Rate Wireless Personal Area Networks
IEEE Transactions on Mobile Computing
Congestion Adaptive Routing in Mobile Ad Hoc Networks
IEEE Transactions on Parallel and Distributed Systems
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network
Computer Networks: The International Journal of Computer and Telecommunications Networking
On improving the efficiency of truthful routing in MANETs with selfish nodes
Pervasive and Mobile Computing
A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Cryptographic Versus Trust-based Methods for MANET Routing Security
Electronic Notes in Theoretical Computer Science (ENTCS)
International Journal of Security and Networks
Anonymous Routing for Mobile Wireless Ad Hoc Networks
International Journal of Distributed Sensor Networks - Heterogenous Wireless Ad Hoc and Sensor Networks
SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
A Novel Approach for Security and Robustness in Wireless Embedded Systems
SEUS '08 Proceedings of the 6th IFIP WG 10.2 international workshop on Software Technologies for Embedded and Ubiquitous Systems
ESecRout: An Energy Efficient Secure Routing for Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
TSR: trust-based secure MANET routing using HMMs
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme
Journal of Computer Science and Technology
Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks
International Journal of Security and Networks
Improving SAODV protocol with trust levels management, IDM and incentive cooperation in MANET
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
An adaptive fuzzy logic based secure routing protocol in mobile ad hoc networks
Fuzzy Sets and Systems
Securing data through avoidance routing
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Reliable delivery of event data from sensors to actuators in pervasive computing environments
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Cost-sensitive intrusion responses for mobile ad hoc networks
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
Robustness of DTN against routing attacks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Trust based security in MANET routing protocols: a survey
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India
Shared RSA key generation in a mobile ad hoc network
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Self-monitoring security in ad hoc routing
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Secure data transmission on multiple paths in mobile ad hoc networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Energy conserving security mechanism for wireless sensor network
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Self-organized security architecture for MANET
CIT'04 Proceedings of the 7th international conference on Intelligent Information Technology
DEMEM: distributed evidence-driven message exchange intrusion detection model for MANET
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
International Journal of Network Management
Hash chains at the basis of a secure reactive routing protocol
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Secure routing in MANETs using local times
Wireless Networks
Performance comparison of end-to-end and on-the-spot traffic-aware techniques
International Journal of Communication Systems
Hi-index | 0.00 |
We propose a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the routes discovered by ad hoc routing protocols. We develop a two-tier classification of routing protocol security metrics, and propose a framework to measure and enforce security attributes on ad hoc routing paths. Our framework enables applications to adapt their behavior according to the level of protection available on communicating nodes in an ad hoc network.