Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Trust based adaptive on demand ad hoc routing protocol
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Quality of service in mobile ad hoc networks
The handbook of ad hoc wireless networks
Security in wireless ad hoc networks
The handbook of ad hoc wireless networks
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
Security issues in ad hoc networks
The handbook of ad hoc wireless networks
Peer-to-Peer Security in Mobile Devices: A User Perspective
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments
Wireless Personal Communications: An International Journal
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
Secure and efficient key management in mobile ad hoc networks
Journal of Network and Computer Applications
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
Computer Communications
Mitigating routing vulnerabilities in ad hoc networks using reputations
International Journal of Information and Computer Security
A secure routing protocol SDSR for mobile ad hoc networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Anonymous routing in wireless mobile ad hoc networks to prevent location disclosure attacks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Multipath routing protocols for mobile ad hoc networks: security issues and performance evaluation
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Hi-index | 0.00 |
We propose a new routing technique called Security-Aware Ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the routes discovered by ad hoc routing protocols. We develop a two-tier classification of routing protocol security metrics, and propose a framework to measure and enforce security attributes on ad hoc routing paths. Our framework enables applications to adapt their behavior according to the level of protection available on communicating nodes in an ad hoc network.