Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Secure multicast groups on ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Quality of service in mobile ad hoc networks
The handbook of ad hoc wireless networks
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
Security issues in ad hoc networks
The handbook of ad hoc wireless networks
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Visualization of wormholes in sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Key management and delayed verification for ad hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Interactive wormhole detection and evaluation
Information Visualization
An efficient scheme for secure group communication in mobile wireless sensor networks
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Visualisation of wormholes in underwater sensor networks: a distributed approach
International Journal of Security and Networks
Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks
International Journal of Security and Networks
Anonymous communication protocol for sensor networks
International Journal of Wireless and Mobile Computing
A secure data transmission protocol for mobile ad hoc networks
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Secure AODV routing protocol using one-time signature
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
SDD: secure directed diffusion protocol for sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Secure and scalable routing protocol for mobile ad-hoc networks
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Hi-index | 0.00 |
Text of abstract Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distinct security requirements. We propose a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Our protocol, ARAN, is based on certificates and successfully defeats all identified attacks.