A survey of routing techniques for mobile communications networks
Mobile Networks and Applications - Special issue: routing in mobile communications networks
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Simple forward-secure signatures from any signature scheme
Proceedings of the 7th ACM conference on Computer and communications security
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Child-proof authentication for MIPv6 (CAM)
ACM SIGCOMM Computer Communication Review
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
An efficient message authentication scheme for link state routing
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
Key agreement in ad hoc networks
Computer Communications
IEEE Network: The Magazine of Global Internetworking
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Modeling vulnerabilities of ad hoc routing protocols
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Integrating heterogeneous wireless technologies: a cellular aided mobile Ad Hoc network (CAMA)
Mobile Networks and Applications
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
A framework of secure location service for position-based ad hoc routing
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Collaborative backup for dependable mobile applications
MPAC '04 Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing
Towards provable security for ad hoc routing protocols
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Sinkhole Intrusion Indicators in DSR MANETs
BROADNETS '04 Proceedings of the First International Conference on Broadband Networks
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
A secure ad-hoc routing approach using localized self-healing communities
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Wireless mesh networks: a survey
Computer Networks and ISDN Systems
Experimental comparisons between SAODV and AODV routing protocols
WMuNeP '05 Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Key management and delayed verification for ad hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
On the fairness of flow aggregation for denial-of-service resistant QoS in MANETs
QShine '06 Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks
Architectural framework for wireless mobile ad hoc networks (AF WMANETs)
Computer Communications
A framework for security analysis of mobile wireless networks
Theoretical Computer Science - Automated reasoning for security protocol analysis
Performance evaluation of multicast ad hoc on-demand distance vector protocol
Computer Communications
Integrating a trust framework with a distributed certificate validation scheme for MANETs
EURASIP Journal on Wireless Communications and Networking
Stimulating cooperation in route discovery of ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
A service-centric approach to access control and monitoring based on distributed trust
CASCON '07 Proceedings of the 2007 conference of the center for advanced studies on Collaborative research
Cryptographic Versus Trust-based Methods for MANET Routing Security
Electronic Notes in Theoretical Computer Science (ENTCS)
Mitigating attacks against virtual coordinate based routing in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Slander-resistant forwarding isolation in ad hoc networks
International Journal of Mobile Network Design and Innovation
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
Computer Communications
Routing in outer space: fair traffic load in multi-hop wireless networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Group-Based Key Management for Multicast of Ad Hoc Sensor Network
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
Energy Efficient Forwarding Scheme for Secure Wireless Ad Hoc Routing Protocols
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network
ICCSA '08 Proceeding sof the international conference on Computational Science and Its Applications, Part I
ESecRout: An Energy Efficient Secure Routing for Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
Impact of denial of service attacks on ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Secure and Efficient Data Collection in Sensor Networks
Wireless Systems and Mobility in Next Generation Internet
Prevention of Black-Hole Attack using One-Way Hash Chain Scheme in Ad-Hoc Networks
Information Networking. Towards Ubiquitous Networking and Services
An attacker model for MANET routing security
Proceedings of the second ACM conference on Wireless network security
Securing Layer-2 Path Selection in Wireless Mesh Networks
Information Security Applications
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
A secure credit-based cooperation stimulating mechanism for MANETs using hash chains
Future Generation Computer Systems
Secure network coding for wireless mesh networks: Threats, challenges, and directions
Computer Communications
Private logical neighborhoods for wireless ad hoc networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Securing AODV against wormhole attacks in emergency MANET multimedia communications
Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
SEAODV: secure efficient AODV routing protocol for MANETs networks
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Security enhancement over ad-hoc AODV routing protocol
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks
Wireless Personal Communications: An International Journal
A performance analysis emulation framework for wireless on-demand applications and services
WONS'09 Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services
Adaptable misbehavior detection and isolation in wireless ad hoc networks using policies
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Formal Security Analysis for Ad-Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
Secure and robust virtual coordinate system in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
An analytical model of routing, misbehavior, and countermeasures in mobile ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
IEEE Transactions on Wireless Communications
A robust anonymous ad hoc on-demand routing
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Demand-driven publish/subscribe in mobile environments
Wireless Networks
Secure neighborhood routing protocol
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A correctness proof of the SRP protocal
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
COSR: a reputation-based secure route protocol in MANET
EURASIP Journal on Wireless Communications and Networking - Special issue on multimedia communications over next generation wireless networks
A trust-based IDS for the AODV protocol
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Practical defenses against pollution attacks in wireless network coding
ACM Transactions on Information and System Security (TISSEC)
SEAODV: a security enhanced AODV routing protocol for wireless mesh networks
Transactions on computational science XI
Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
ETUS: enhanced triple umpiring system for security and robustness of wireless mobile ad hoc networks
International Journal of Communication Networks and Distributed Systems
Simulations, models, and testbeds: A mutual catalysis
Performance Evaluation
A secure global state routing for mobile ad hoc networks
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Self-monitoring security in ad hoc routing
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Security approaches for cluster interconnection in a wireless sensor network
APNOMS'06 Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services
Provable security of on-demand distance vector routing in wireless ad hoc networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Mitigating route request flooding attacks in mobile ad hoc networks
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Robust routing in malicious environment for ad hoc networks
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Advanced detection of selfish or malicious nodes in ad hoc networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
DEMEM: distributed evidence-driven message exchange intrusion detection model for MANET
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
SHWMP: a secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks
Transactions on Computational Science VI
An efficient scheme for detecting malicious nodes in mobile ad hoc networks
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
MoteAODV – an AODV implementation for TinyOS 2.0
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Identity based secure AODV and TCP for mobile ad hoc networks
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
A review of routing protocols for mobile ad hoc networks
WSEAS TRANSACTIONS on COMMUNICATIONS
Review: Security threats and solutions in MANETs: A case study using AODV and SAODV
Journal of Network and Computer Applications
Analytical models for trust based routing protocols in wireless ad hoc networks
ACM SIGSOFT Software Engineering Notes
Enhanced dynamic source routing protocol for mitigating black hole attack
International Journal of Wireless and Mobile Computing
Formal analysis of privacy for routing protocols in mobile ad hoc networks
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
Adversarial testing of wireless routing implementations
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Secure and robust multipath routings for advanced metering infrastructure
The Journal of Supercomputing
International Journal of Ad Hoc and Ubiquitous Computing
A proof technique for security assessment of on-demand ad hoc routing protocols
International Journal of Security and Networks
Modified DSR protocol for detection and removal of selective black hole attack in MANET
Computers and Electrical Engineering
Hi-index | 0.00 |
We consider the problem of incorporating security mechanisms into routing protocols for ad hoc networks. Canned security solutions like IPSec are not applicable. We look at AODV[21] in detail and develop a security mechanism to protect its routing information. We also briefly discuss whether our techniques would also be applicable to other similar routing protocols and about how a key management scheme could be used in conjunction with the solution that we provide.