Preventing Impersonation Attacks in MANET with Multi-Factor Authentication
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Misbehavior resilient multi-path data transmission in mobile ad-hoc networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Communications in unknown networks: Preserving the secret of topology
Theoretical Computer Science
Automated Evaluation of Secure Route Discovery in MANET Protocols
SPIN '08 Proceedings of the 15th international workshop on Model Checking Software
Robust and secure routing scheme for wireless multihop network
Personal and Ubiquitous Computing
Using SCTP to implement multihomed web servers
DNIS'07 Proceedings of the 5th international conference on Databases in networked information systems
Secure data transmission on multiple paths in mobile ad hoc networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Communications in unknown networks: preserving the secret of topology
SIROCCO'05 Proceedings of the 12th international conference on Structural Information and Communication Complexity
Performance analysis of secure multipath routing protocols for mobile ad hoc networks
WWIC'05 Proceedings of the Third international conference on Wired/Wireless Internet Communications
Towards provable security for ubiquitous applications
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Multipath routing protocols for mobile ad hoc networks: security issues and performance evaluation
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
On a low security overhead mechanism for secure multi-path routing protocol in wireless mesh network
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
Hi-index | 0.00 |
Mobile ad hoc networks (MANETs) are collections of autonomousmobile nodes with links that are made or brokenin an arbitrary way. They have no fixed infrastructure andmay have constrained resources. The next generation of ITapplications is expected to rely heavily on such networks.However, before they can be successfully deployed severalsecurity threats must be addressed. These are mainly due tothe ad hoc nature of these networks. Consequently it may bemuch harder (or even impossible) to establish routing communicationpaths that can tolerate malicious faults. In thispaper we first propose a general Bayesian model that satisfiesthe basic mobility requirements of a MANET and definethe requirements for secure communication in this model.We then consider several multipath routing schemes andpropose a new adaptive multipath routing algorithm thatsatisfies our security requirements.