On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Security in wireless ad hoc networks
The handbook of ad hoc wireless networks
Sinkhole Intrusion Indicators in DSR MANETs
BROADNETS '04 Proceedings of the First International Conference on Broadband Networks
Securing ad hoc networks through mobile agent
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Efficient and robust key management for large mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
Modeling Ad-hoc rushing attack in a negligibility-based security framework
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Robust cooperative trust establishment for MANETs
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
On identifying malicious nodes in ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
Computer Communications
Secure multi-hop network programming with multiple one-way key chains
WiSec '08 Proceedings of the first ACM conference on Wireless network security
HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
ESecRout: An Energy Efficient Secure Routing for Sensor Networks
International Journal of Distributed Sensor Networks - Advances on Heterogeneous Wireless Sensor Networks
Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks
Wireless Personal Communications: An International Journal
Secure neighborhood routing protocol
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
COSR: a reputation-based secure route protocol in MANET
EURASIP Journal on Wireless Communications and Networking - Special issue on multimedia communications over next generation wireless networks
Improving security in WMNs with reputation systems and self-organizing maps
Journal of Network and Computer Applications
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Journal of Network and Computer Applications
WRL: a wormhole-resistent localization scheme based on DV-hop for wireless sensor networks
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
AINTEC'05 Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks
A system for power-aware agent-based intrusion detection (SPAID) in wireless ad hoc networks
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
A specification-based intrusion detection model for OLSR
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Formal security analysis of Ariadne secure routing protocol using model checking
International Journal of Ad Hoc and Ubiquitous Computing
Advanced detection of selfish or malicious nodes in ad hoc networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
SDD: secure directed diffusion protocol for sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Performance analysis of secure multipath routing protocols for mobile ad hoc networks
WWIC'05 Proceedings of the Third international conference on Wired/Wireless Internet Communications
DEMEM: distributed evidence-driven message exchange intrusion detection model for MANET
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
MoteAODV – an AODV implementation for TinyOS 2.0
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Topological detection on wormholes in wireless ad hoc and sensor networks
IEEE/ACM Transactions on Networking (TON)
A semantic analysis of key management protocols for wireless sensor networks
Science of Computer Programming
Hi-index | 0.00 |
The secure operation of the routing protocol is one of the majorchallenges to be met for the proliferation of the Mobile Ad hocNetworking (MANET) paradigm. Nevertheless, securityenhancements have been proposed mostly for reactive MANETprotocols. The proposed here Secure Link State Routing Protocol(SLSP) provides secure proactive topology discovery, which canbe multiply beneficial to the network operation. SLSP can beemployed as a stand-alone protocol, or fit naturally into a hybridrouting framework, when combined with a reactive protocol.SLSP is robust against individual attackers, it is capable ofadjusting its scope between local and network-wide topologydiscovery, and it is capable of operating in networks offrequently changing topology and membership.