Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Path set selection in mobile ad hoc networks
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Secure Link State Routing for Mobile Ad Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Digital signature protection of the OSPF routing protocol
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
On the Vulnerabilities and Protection of OSPF Routing Protocol
IC3N '98 Proceedings of the International Conference on Computer Communications and Networks
Security-Aware Ad hoc Routing for Wireless Networks
Security-Aware Ad hoc Routing for Wireless Networks
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
SNMPv3: A security enhancement for SNMP
IEEE Communications Surveys & Tutorials
Key agreement in ad hoc networks
Computer Communications
ANMP: ad hoc network management protocol
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
Computer Communications
Programming pervasive and mobile computing applications: The TOTA approach
ACM Transactions on Software Engineering and Methodology (TOSEM)
Detect DDoS flooding attacks in mobile ad hoc networks
International Journal of Security and Networks
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (i)
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Enhancing performance of AODV against Black hole Attack
Proceedings of the CUBE International Information Technology Conference
Hi-index | 0.00 |
The realm of wireless ad hoc networks is a relatively new one, even with advancement in wireless networks in general. Essentially, these are networks that do not have an underlying fixed infrastructure. Mobile hosts "join" in, on the fly, and create a network on their own. With the network topology changing dynamically and the lack of a centralized network management functionality, these networks tend to be vulnerable to a number of attacks. If such networks are to succeed in the commercial world, the security aspect naturally assumes paramount importance. There is a need to devise security solutions to prevent attacks that jeopardize the secure network operation. This survey chapter aims to provide a state-of-the-art view of security in wireless ad hoc networks. An attempt has been made to discuss the core issues and requirements of security, followed by the current state of research and development in this area, which includes algorithms, architectures, and network management schemes.