Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Differential Fault Analysis of Secret Key Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
IEEE Network: The Magazine of Global Internetworking
Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
TARP: trust-aware routing protocol
Proceedings of the 2006 international conference on Wireless communications and mobile computing
A heterogeneous-network aided public-key management scheme for mobile ad hoc networks
International Journal of Network Management
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Authenticated routing for ad hoc networks protocol and misbehaving nodes
TELE-INFO'05 Proceedings of the 4th WSEAS International Conference on Telecommunications and Informatics
ESecRout: An Energy Efficient Secure Routing for Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
A secure location service for ad hoc position-based routing using self-signed locations
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
A secure intra-domain routing protocol for wireless mesh networks
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Key distribution in mobile ad hoc networks based on message relaying
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Castor: scalable secure routing for ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
An effective intrusion detection approach for OLSR MANET protocol
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Improving security in WMNs with reputation systems and self-organizing maps
Journal of Network and Computer Applications
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Journal of Network and Computer Applications
Shared RSA key generation in a mobile ad hoc network
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Trust-based minimum cost opportunistic routing for Ad hoc networks
Journal of Systems and Software
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
Computer Communications
Service oriented networks – dynamic distributed qos routing framework
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Advanced detection of selfish or malicious nodes in ad hoc networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Review: Security threats and solutions in MANETs: A case study using AODV and SAODV
Journal of Network and Computer Applications
Security model for emergency real-time communications in autonomous networks
Information Systems Frontiers
Impact of trust model on on-demand multi-path routing in mobile ad hoc networks
Computer Communications
Securing data provenance in body area networks using lightweight wireless link fingerprints
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Performance of IEEE 802.11 under Jamming
Mobile Networks and Applications
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks
Mobile Networks and Applications
Hi-index | 0.00 |
This article gives an overview of different approaches to provide security features to routing protocols in mobile ad hoc networks (MANET). It also describes Secure AODV (an extension to AODV that provides security features) giving a summary of its operation and talking about future enhancements to the protocol.