Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Report on a working session on security in wireless ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Network intrusion visualization with NIVA, an intrusion detection visual and haptic analyzer
Information Visualization
Secure Hosts Autoconfiguration in Mobile Ad Hoc Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Kerberos assisted Authentication in Mobile Ad-hoc Networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
An approach to certificate path discovery in mobile Ad Hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Peer-to-Peer Security in Mobile Devices: A User Perspective
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
Proceedings of the 3rd ACM workshop on Wireless security
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
A novel solution for achieving anonymity in wireless ad hoc networks
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Collaborative backup for dependable mobile applications
MPAC '04 Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing
An advanced signature system for OLSR
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Towards provable security for ad hoc routing protocols
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Securing ad hoc networks through mobile agent
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Link Layer Security for SAHN Protocols
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
A secure ad-hoc routing approach using localized self-healing communities
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Hidden-action in multi-hop routing
Proceedings of the 6th ACM conference on Electronic commerce
Wireless mesh networks: a survey
Computer Networks and ISDN Systems
Dependable Dynamic Source Routing without a trusted third party
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
Experimental comparisons between SAODV and AODV routing protocols
WMuNeP '05 Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
Efficient and robust key management for large mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Authentication based on multilayer clustering in ad hoc networks
EURASIP Journal on Wireless Communications and Networking
Trust Establishment In Pure Ad-hoc Networks
Wireless Personal Communications: An International Journal
TARP: trust-aware routing protocol
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
Modeling Ad-hoc rushing attack in a negligibility-based security framework
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
On the fairness of flow aggregation for denial-of-service resistant QoS in MANETs
QShine '06 Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks
LARS: a locally aware reputation system for mobile ad hoc networks
Proceedings of the 44th annual Southeast regional conference
Identity-based secure collaboration in wireless ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Performance Evaluation - Performance modelling and evaluation of wireless ad hoc and sensor networks
A framework for security analysis of mobile wireless networks
Theoretical Computer Science - Automated reasoning for security protocol analysis
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
Computer Standards & Interfaces
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
IEEE Transactions on Mobile Computing
Non-interactive key establishment in mobile ad hoc networks
Ad Hoc Networks
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
On identifying malicious nodes in ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Integrating a trust framework with a distributed certificate validation scheme for MANETs
EURASIP Journal on Wireless Communications and Networking
A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Improving data transmission with helping nodes for geographical ad hoc routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Routing based authentication for mobile ad hoc network in home environment
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Aggregate designated verifier signatures and application to secure routing
International Journal of Security and Networks
International Journal of Security and Networks
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Collaborative Dynamic Source Routing using transitional trust filters
International Journal of Information and Computer Security
Key management in ad hoc networks using self-certified public key system
International Journal of Mobile Communications
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Routing in outer space: fair traffic load in multi-hop wireless networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
HEAP: A packet authentication scheme for mobile ad hoc networks
Ad Hoc Networks
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network
ICCSA '08 Proceeding sof the international conference on Computational Science and Its Applications, Part I
Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks
International Journal of Security and Networks
Impact of denial of service attacks on ad hoc networks
IEEE/ACM Transactions on Networking (TON)
MobiSEC: a novel security architecture for wireless mesh networks
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
TSR: trust-based secure MANET routing using HMMs
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks
NPC '08 Proceedings of the IFIP International Conference on Network and Parallel Computing
Securing Layer-2 Path Selection in Wireless Mesh Networks
Information Security Applications
Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Adaptive intrusion detection & prevention of denial of service attacks in MANETs
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Secure network coding for wireless mesh networks: Threats, challenges, and directions
Computer Communications
Mitigating routing vulnerabilities in ad hoc networks using reputations
International Journal of Information and Computer Security
Secure hosts auto-configuration in mobile ad hoc networks
Ad Hoc Networks
Minimizing detection probability routing in ad hoc networks using directional antennas
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Efficient and robust key management for large mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
SEAODV: secure efficient AODV routing protocol for MANETs networks
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Security enhancement over ad-hoc AODV routing protocol
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Key management for lightweight ad-hoc routing authentication
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
An efficient authentication and key management protocol for hierarchical ad hoc sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Improving SAODV protocol with trust levels management, IDM and incentive cooperation in MANET
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
CIT'09 Proceedings of the 3rd International Conference on Communications and information technology
Security enforcement in wireless sensor networks: A framework based on non-cooperative games
Pervasive and Mobile Computing
A secure data transmission protocol for mobile ad hoc networks
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Cost-sensitive intrusion responses for mobile ad hoc networks
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
Collaborative location certification for sensor networks
ACM Transactions on Sensor Networks (TOSN)
A secure location service for ad hoc position-based routing using self-signed locations
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
A secure intra-domain routing protocol for wireless mesh networks
ICISS'07 Proceedings of the 3rd international conference on Information systems security
A group-based key management protocol for mobile ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
A cluster-based trust-aware routing protocol for mobile ad hoc networks
Wireless Networks
Anti-localization anonymous routing for Delay Tolerant Network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Castor: scalable secure routing for ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Formal verification of secure ad hoc routing protocols using AVISPA: ARAN case study
ECC'10 Proceedings of the 4th conference on European computing conference
International Journal of Communication Networks and Distributed Systems
A secure coverage area expansion scheme for public wireless LAN services
International Journal of Information Technology and Management
Secure neighborhood routing protocol
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A correctness proof of the SRP protocal
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Journal of Network and Computer Applications
THWMP: trust based secure routing for wireless mesh networks
Proceedings of the 2011 International Conference on Communication, Computing & Security
A trust-based IDS for the AODV protocol
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Secure routing in ad hoc networks and a related intrusion detection problem
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
An identity-based scheme for ad hoc network secure routing protocol from pairing
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
WRL: a wormhole-resistent localization scheme based on DV-hop for wireless sensor networks
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
SEAODV: a security enhanced AODV routing protocol for wireless mesh networks
Transactions on computational science XI
Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
ETUS: enhanced triple umpiring system for security and robustness of wireless mobile ad hoc networks
International Journal of Communication Networks and Distributed Systems
A clique-based secure admission control scheme for mobile ad hoc networks (MANETs)
Journal of Network and Computer Applications
The topology aware file distribution problem
COCOON'11 Proceedings of the 17th annual international conference on Computing and combinatorics
Self-monitoring security in ad hoc routing
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Provable security of on-demand distance vector routing in wireless ad hoc networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
A secure routing protocol SDSR for mobile ad hoc networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
AINTEC'05 Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks
Threshold authenticated key configuration scheme based on multi-layer clustering in mobile ad hoc
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
A secure multicast routing protocol for ad hoc networks with misbehaving nodes
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
A specification-based intrusion detection model for OLSR
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Service oriented networks – dynamic distributed qos routing framework
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Security enhancement mechanism for ad-hoc OLSR protocol
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Formal security analysis of Ariadne secure routing protocol using model checking
International Journal of Ad Hoc and Ubiquitous Computing
Peer collaboration in wireless ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Applying mobile agent to intrusion response for ad hoc networks
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part II
Robust routing in malicious environment for ad hoc networks
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Advanced detection of selfish or malicious nodes in ad hoc networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Enhancing the security of on-demand routing in ad hoc networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
Secure anonymous routing for MANETs using distributed dynamic random path selection
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
DEMEM: distributed evidence-driven message exchange intrusion detection model for MANET
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
Collaborative trust-based shortest secure path discovery in mobile ad hoc networks
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part II
SHWMP: a secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks
Transactions on Computational Science VI
FRI-attack: fraduelent routing information attack on wireless mesh network
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
Identity based secure AODV and TCP for mobile ad hoc networks
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
International Journal of Network Management
Review: Security threats and solutions in MANETs: A case study using AODV and SAODV
Journal of Network and Computer Applications
Analytical models for trust based routing protocols in wireless ad hoc networks
ACM SIGSOFT Software Engineering Notes
Local key management in opportunistic networks
International Journal of Communication Networks and Distributed Systems
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Topological detection on wormholes in wireless ad hoc and sensor networks
IEEE/ACM Transactions on Networking (TON)
Secure routing in MANETs using local times
Wireless Networks
MAC aggregation protocols resilient to DoS attacks
International Journal of Security and Networks
Performance comparison of end-to-end and on-the-spot traffic-aware techniques
International Journal of Communication Systems
An efficient detection model of selective forwarding attacks in wireless mesh networks
IDCS'12 Proceedings of the 5th international conference on Internet and Distributed Computing Systems
Enhanced dynamic source routing protocol for mitigating black hole attack
International Journal of Wireless and Mobile Computing
Adversarial testing of wireless routing implementations
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
On the practicality of cryptographic defences against pollution attacks in wireless network coding
ACM Computing Surveys (CSUR)
An intrusion detection & adaptive response mechanism for MANETs
Ad Hoc Networks
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks
Mobile Networks and Applications
A proof technique for security assessment of on-demand ad hoc routing protocols
International Journal of Security and Networks
The topology aware file distribution problem
Journal of Combinatorial Optimization
Modified DSR protocol for detection and removal of selective black hole attack in MANET
Computers and Electrical Engineering
Hi-index | 0.00 |
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols,specifically examining AODV and DSR. In light of these threats, we identify three different environments with distinct security requirements. We propose a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Our protocol, ARAN, is based on certificates and successfully defeats all identified attacks.