Interconnections: bridges and routers
Interconnections: bridges and routers
Integration of security in network routing protocols
ACM SIGSAC Review
Protecting routing infrastructures from denial of service using cooperative intrusion detection
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Location-aided routing (LAR) in mobile ad hoc networks
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Understanding BGP misconfiguration
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Secure Link State Routing for Mobile Ad Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Security-Aware Ad hoc Routing for Wireless Networks
Security-Aware Ad hoc Routing for Wireless Networks
An efficient message authentication scheme for link state routing
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
The capacity of wireless networks
IEEE Transactions on Information Theory
Secure Border Gateway Protocol (S-BGP)
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
Proceedings of the 3rd ACM workshop on Wireless security
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Visualization of wormholes in sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
A secure ad-hoc routing approach using localized self-healing communities
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Experimental comparisons between SAODV and AODV routing protocols
WMuNeP '05 Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
Trust Establishment In Pure Ad-hoc Networks
Wireless Personal Communications: An International Journal
Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Improved security in geographic ad hoc routing through autonomous position verification
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
Modeling Ad-hoc rushing attack in a negligibility-based security framework
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Cross-layer designs for mitigating range attacks in ad hoc networks
PDCN'06 Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Architectural framework for wireless mobile ad hoc networks (AF WMANETs)
Computer Communications
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Theoretical bounds on control-plane self-monitoring in routing protocols
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
Visualisation of wormholes in underwater sensor networks: a distributed approach
International Journal of Security and Networks
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
Impact of denial of service attacks on ad hoc networks
IEEE/ACM Transactions on Networking (TON)
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Prevention of Black-Hole Attack using One-Way Hash Chain Scheme in Ad-Hoc Networks
Information Networking. Towards Ubiquitous Networking and Services
Adaptive intrusion detection & prevention of denial of service attacks in MANETs
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Robust and secure routing scheme for wireless multihop network
Personal and Ubiquitous Computing
Private logical neighborhoods for wireless ad hoc networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
INSENS: Intrusion-tolerant routing for wireless sensor networks
Computer Communications
Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks
Wireless Personal Communications: An International Journal
Key management for lightweight ad-hoc routing authentication
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
Critical issues in trust management for mobile ad-hoc networks
IRI'09 Proceedings of the 10th IEEE international conference on Information Reuse & Integration
Gateway Selection Protocol in Hybrid MANET Using DYMO Routing
Mobile Networks and Applications
Survey of attacks on AODV and MAODV
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Security enforcement in wireless sensor networks: A framework based on non-cooperative games
Pervasive and Mobile Computing
An analytical model of routing, misbehavior, and countermeasures in mobile ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Computers & Mathematics with Applications
Reinforcement learning for quality of service in mobile ad hoc network (MANET)
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
IEEE Transactions on Wireless Communications
Robustness of DTN against routing attacks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Castor: scalable secure routing for ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Secure neighborhood routing protocol
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Understanding dynamic denial of service attacks in mobile ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Comparison of two intrusion detection schemes for sparsely connected ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
COSR: a reputation-based secure route protocol in MANET
EURASIP Journal on Wireless Communications and Networking - Special issue on multimedia communications over next generation wireless networks
Journal of Parallel and Distributed Computing
AOS: an anonymous overlay system for mobile ad hoc networks
Wireless Networks
Simulations, models, and testbeds: A mutual catalysis
Performance Evaluation
A clique-based secure admission control scheme for mobile ad hoc networks (MANETs)
Journal of Network and Computer Applications
Bullet-proof verification (BPV) method to detect black hole attack in mobile ad hoc networks
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
Secure AODV routing protocol using one-time signature
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Energy conserving security mechanism for wireless sensor network
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Robust routing in malicious environment for ad hoc networks
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Towards provable security for ubiquitous applications
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
So near and yet so far: distance-bounding attacks in wireless networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Review: Security threats and solutions in MANETs: A case study using AODV and SAODV
Journal of Network and Computer Applications
MSN: mutual secure neighbor verification in multi-hop wireless networks
Security and Communication Networks
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure routing in MANETs using local times
Wireless Networks
Review: Securing DSR against wormhole attacks in multirate ad hoc networks
Journal of Network and Computer Applications
Mitigating collaborative blackhole attacks on DSR-Based mobile ad hoc networks
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
A Novel Robust Routing Scheme Against Rushing Attacks in Wireless Ad Hoc Networks
Wireless Personal Communications: An International Journal
Performance Enhanced AODV Routing Protocol Security in Mobile Ad-Hoc Networks
International Journal of Technology Diffusion
A collaborative routing protocol against routing disruptions in MANETs
Personal and Ubiquitous Computing
An anonymous distributed routing protocol in mobile ad-hoc networks
The Journal of Supercomputing
An intrusion detection & adaptive response mechanism for MANETs
Ad Hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.01 |
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many of the proposed routing protocols for ad hoc networks operate in an on-demand fashion, as on-demand routing protocols have been shown to often have lower overhead and faster reaction time than other types of routing based on periodic (proactive) mechanisms. Significant attention recently has been devoted to developing secure routing protocols for ad~hoc networks, including a number of secure on-demand routing protocols, that defend against a variety of possible attacks on network routing. In this paper, we present the rushing attack, a new attack that results in denial-of-service when used against all previous on-demand ad~hoc network routing protocols. For example, DSR, AODV, and secure protocols based on them, such as Ariadne, ARAN, and SAODV, are unable to discover routes longer than two hops when subject to this attack. This attack is also particularly damaging because it can be performed by a relatively weak attacker. We analyze why previous protocols fail under this attack. We then develop Rushing Attack Prevention (RAP), a generic defense against the rushing attack for on-demand protocols. RAP incurs no cost unless the underlying protocol fails to find a working route, and it provides provable security properties even against the strongest rushing attackers.