MACAW: a media access protocol for wireless LAN's
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
The official PGP user's guide
Protecting routing infrastructures from denial of service using cooperative intrusion detection
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
When the CRC and TCP checksum disagree
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Computer Networking: A Top-Down Approach Featuring the Internet Package
Computer Networking: A Top-Down Approach Featuring the Internet Package
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Digital signature protection of the OSPF routing protocol
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
An efficient message authentication scheme for link state routing
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
PGP in constrained wireless devices
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Efficient security mechanisms for the border gateway routing protocol
Computer Communications
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Research Issues in Ad-Hoc Distributed Personal Networking
Wireless Personal Communications: An International Journal
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Integrating heterogeneous wireless technologies: a cellular aided mobile Ad Hoc network (CAMA)
Mobile Networks and Applications
Security for wireless sensor networks
Wireless sensor networks
Security for wireless sensor networks
Wireless sensor networks
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
Proceedings of the 3rd ACM workshop on Wireless security
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
An Adaptive and Predictive Security Model for Mobile Ad hoc Networks
Wireless Personal Communications: An International Journal
Preventing Impersonation Attacks in MANET with Multi-Factor Authentication
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
A secure ad-hoc routing approach using localized self-healing communities
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Trust Establishment In Pure Ad-hoc Networks
Wireless Personal Communications: An International Journal
Preserving Traffic Privacy in Wireless Mesh Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Cooperation monitoring issues in ad hoc networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Toward Secure Low Rate Wireless Personal Area Networks
IEEE Transactions on Mobile Computing
Modeling Ad-hoc rushing attack in a negligibility-based security framework
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Achieving privacy in mesh networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
Communications in unknown networks: Preserving the secret of topology
Theoretical Computer Science
Cryptographic Versus Trust-based Methods for MANET Routing Security
Electronic Notes in Theoretical Computer Science (ENTCS)
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
Computer Communications
How to avoid packet droppers with proactive routing protocols for ad hoc networks
International Journal of Network Management
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
Automated Evaluation of Secure Route Discovery in MANET Protocols
SPIN '08 Proceedings of the 15th international workshop on Model Checking Software
Impact of denial of service attacks on ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Byzantine Consensus with Unknown Participants
OPODIS '08 Proceedings of the 12th International Conference on Principles of Distributed Systems
Hop chains: Secure routing and the establishment of distinct identities
Theoretical Computer Science
An attacker model for MANET routing security
Proceedings of the second ACM conference on Wireless network security
Proceedings of the second ACM conference on Wireless network security
Authenticated Adversarial Routing
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Packet-dropping adversary identification for data plane security
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Design and simulation on data-forwarding security in sensor networks
International Journal of Information and Computer Security
Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks
IEEE Transactions on Wireless Communications
Routing with Byzantine robustness
Routing with Byzantine robustness
A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
Survey of attacks on AODV and MAODV
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
A secure data transmission protocol for mobile ad hoc networks
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Reliable delivery of event data from sensors to actuators in pervasive computing environments
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks
Journal of Network and Systems Management
Protocols and lower bounds for failure localization in the internet
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Resilience to dropping nodes in mobile ad hoc networks with link-state routing
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
Routing security scheme based on reputation evaluation in hierarchical ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A group-based key management protocol for mobile ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Robustness of DTN against routing attacks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Characterizing the spread of correlated failures in large wireless networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
The SMesh wireless mesh network
ACM Transactions on Computer Systems (TOCS)
Asynchronous throughput-optimal routing in malicious networks
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II
Comparison of two intrusion detection schemes for sparsely connected ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks
Computer Communications
Shared RSA key generation in a mobile ad hoc network
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
A clique-based secure admission control scheme for mobile ad hoc networks (MANETs)
Journal of Network and Computer Applications
Bullet-proof verification (BPV) method to detect black hole attack in mobile ad hoc networks
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
Proactive resilience to dropping nodes in mobile ad hoc networks
AINTEC'06 Proceedings of the Second Asian international conference on Technologies for Advanced Heterogeneous Networks
Hop chains: secure routing and the establishment of distinct identities
OPODIS'06 Proceedings of the 10th international conference on Principles of Distributed Systems
Secure route selection in wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Behavior-Based trust in wireless sensor network
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Self-organized security architecture for MANET
CIT'04 Proceedings of the 7th international conference on Intelligent Information Technology
A system for power-aware agent-based intrusion detection (SPAID) in wireless ad hoc networks
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Formal security analysis of Ariadne secure routing protocol using model checking
International Journal of Ad Hoc and Ubiquitous Computing
Communications in unknown networks: preserving the secret of topology
SIROCCO'05 Proceedings of the 12th international conference on Structural Information and Communication Complexity
Advanced detection of selfish or malicious nodes in ad hoc networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks
Journal of Network and Computer Applications
Towards provable security for ubiquitous applications
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
An efficient scheme for detecting malicious nodes in mobile ad hoc networks
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Dynamics of learning algorithms for the on-demand secure byzantine routing protocol
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
MoteAODV – an AODV implementation for TinyOS 2.0
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Wireless security techniques for coordinated manufacturing and on-line hardware trojan detection
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Fuzzy-based trusted ant routing (FTAR) protocol in mobile ad hoc networks
MIWAI'11 Proceedings of the 5th international conference on Multi-Disciplinary Trends in Artificial Intelligence
Enhanced dynamic source routing protocol for mitigating black hole attack
International Journal of Wireless and Mobile Computing
Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks
International Journal of Business Data Communications and Networking
Energy attacks and defense techniques for wireless systems
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Secure scheme against data dropping
Proceedings of the 16th Communications & Networking Symposium
Hi-index | 0.01 |
An ad hoc wireless network is an autonomous self-organizing system ofmobile nodes connected by wireless links where nodes not in directrange can communicate via intermediate nodes. A common technique usedin routing protocols for ad hoc wireless networks is to establish therouting paths on-demand, as opposed to continually maintaining acomplete routing table. A significant concern in routing is theability to function in the presence of byzantine failures whichinclude nodes that drop, modify, or mis-route packets in an attempt todisrupt the routing service.We propose an on-demand routing protocol for ad hoc wireless networks that provides resilience to byzantine failures caused by individual or colluding nodes. Our adaptive probing technique detects a malicious link after log n faults have occurred, where n is the length of the path. These links are then avoided by multiplicatively increasing their weights and by using an on-demand route discovery protocol that finds a least weight path to the destination.