Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Ambivalent Data Structures for Dynamic 2-Edge-Connectivity and k Smallest Spanning Trees
SIAM Journal on Computing
Performance evaluation of the Orca shared-object system
ACM Transactions on Computer Systems (TOCS)
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The Ad Hoc on-demand distance-vector protocol
Ad hoc networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
ISPAN '00 Proceedings of the 2000 International Symposium on Parallel Architectures, Algorithms and Networks
A high-throughput path metric for multi-hop wireless routing
Proceedings of the 9th annual international conference on Mobile computing and networking
UCAN: a unified cellular and ad-hoc network architecture
Proceedings of the 9th annual international conference on Mobile computing and networking
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
An Ad-hoc Routing Protocol in Hybrid Wireless Networks for Emergency Communications
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
iPass: An Incentive Compatible Auction Scheme to Enable Packet Forwarding Service in MANET
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
An Incentive Mechanism for P2P Networks
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
SLIC: A Selfish Link-Based Incentive Mechanism for Unstructured Peer-to-Peer Networks
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
On location-restricted services
IEEE Network: The Magazine of Global Internetworking
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Routing game in hybrid wireless mesh networks with selfish mesh clients
International Journal of Autonomous and Adaptive Communications Systems
Model for survivability of wireless sensor network
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Secure unified cellular ad hoc network routing
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A secure routing protocol for wireless sensor networks
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Enhanced dynamic source routing protocol for mitigating black hole attack
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with dual cellular and ad-hoc (802.11b) cards. The cellular connection is used for receiving services (i.e. Internet access) from the base station, while the ad-hoc links are used to improve the quality of the connection. We provide detailed descriptions of several attacks that arbitrarily powerful adversaries, whether outsiders or insiders, can mount against well-behaved members of the network. We introduce a secure routing protocol called JANUS, that focuses on the establishment of secure routes between the base station and mobile devices, and the secure routing of the data. We show that our protocol is secure against the attacks described and experimentally compare the message overhead introduced by JANUS and UCAN.