Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
The performance of query control schemes for the zone routing protocol
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Context Authentication Using Constrained Channels
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
IEEE Network: The Magazine of Global Internetworking
Towards provable security for ad hoc routing protocols
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Jamming and sensing of encrypted wireless ad hoc networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
DOA: DSR over AODV Routing for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
HOP: achieving efficient anonymity in MANETs by combining HIP, OLSR, and pseudonyms
Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications
Misbehavior resilient multi-path data transmission in mobile ad-hoc networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
An overlay approach to data security in ad-hoc networks
Ad Hoc Networks
A new security scheme for on-demand source routing in mobile ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
A game-theoretic intrusion detection model for mobile ad hoc networks
Computer Communications
A hybrid data mining anomaly detection technique in ad hoc networks
International Journal of Wireless and Mobile Computing
Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
International Journal of Security and Networks
Autonomic trust reasoning enables misbehavior detection in OLSR
Proceedings of the 2008 ACM symposium on Applied computing
Securing vehicular ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Energy Efficient Forwarding Scheme for Secure Wireless Ad Hoc Routing Protocols
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
Automated Evaluation of Secure Route Discovery in MANET Protocols
SPIN '08 Proceedings of the 15th international workshop on Model Checking Software
A cross-layer dropping attack in video streaming over ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Of malicious motes and suspicious sensors
Theoretical Computer Science
Multimodal security enforcement framework for wireless ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Quantification of Anonymity for Mobile Ad Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
Securing resource-constrained wireless ad hoc networks
IEEE Wireless Communications
d-key dynamic encryption: a security enhancement protocol for mobile ad hoc network
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
Improving SAODV protocol with trust levels management, IDM and incentive cooperation in MANET
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
Enhancing data security in ad hoc networks based on multipath routing
Journal of Parallel and Distributed Computing
Flexible and secure service discovery in ubiquitous computing
Journal of Network and Computer Applications
Authenticating DSR using a novel multisignature scheme based on cubic LFSR sequences
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Recent developments and experimental guidelines in mobile ad-hoc networks
International Journal of Wireless and Mobile Computing
A group-based key management protocol for mobile ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Reliability of wireless sensors with code attestation for intrusion detection
Information Processing Letters
The SMesh wireless mesh network
ACM Transactions on Computer Systems (TOCS)
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Optimum routing protection against cumulative eavesdropping in multihop wireless networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
A-HIP: a solution offering secure and anonymous communications in MANETs
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Journal of Network and Computer Applications
Security analysis of wireless mesh backhauls for mobile networks
Journal of Network and Computer Applications
Verifying and enforcing network paths with icing
Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies
OPODIS'06 Proceedings of the 10th international conference on Principles of Distributed Systems
Secure data transmission on multiple paths in mobile ad hoc networks
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
Provable security of on-demand distance vector routing in wireless ad hoc networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Fine grained load balancing in multi-hop wireless networks
Journal of Parallel and Distributed Computing
Deploying mobile nodes for maximal energy matching in WSNs
Wireless Communications & Mobile Computing
Signs of a bad neighborhood: a lightweight metric for anomaly detection in mobile ad hoc networks
Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks
A secure on-demand source routing scheme using hierarchical clustering in mobile ad hoc networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Trust based secure multipath OLSR routing protocol in MANET using fuzzy theory
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Enhanced dynamic source routing protocol for mitigating black hole attack
International Journal of Wireless and Mobile Computing
Review: Securing DSR against wormhole attacks in multirate ad hoc networks
Journal of Network and Computer Applications
DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
A proof technique for security assessment of on-demand ad hoc routing protocols
International Journal of Security and Networks
Hi-index | 0.00 |
Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Attacks on ad hoc network routing protocols disrupt network performance and reliability. The authors survey the state of research and its challenges in this field.