A hierarchical key management scheme for secure group communications in mobile ad hoc networks
Journal of Systems and Software
Methodologies and frameworks for testing ids in adhoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
International Journal of Mobile Network Design and Innovation
Improving the reliability of ad-hoc on demand distance vector protocol
WSEAS TRANSACTIONS on COMMUNICATIONS
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Critical issues in trust management for mobile ad-hoc networks
IRI'09 Proceedings of the 10th IEEE international conference on Information Reuse & Integration
Neural network Based secure media access control protocol for wireless sensor networks
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cost-effective IDS operating scheme in MANETs
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks
Journal of Network and Systems Management
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments
ACM Transactions on Information and System Security (TISSEC)
Black-hole attacks in P2P mobile networks discovered through Bayesian filters
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems
A wireless intrusion detection system for secure clustering and routing in ad hoc networks
ISC'06 Proceedings of the 9th international conference on Information Security
Secure route selection in wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Intrusion Detection Algorithm for MANET
International Journal of Information Security and Privacy
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
Distributed and Parallel Databases
Hi-index | 0.00 |
Numerous schemes have been proposed for secure routing and Intrusion Detection for ad hoc networks. Yet, little work exists in actually implementing such schemes on small handheld devices. In this paper, we present a proof-of-concept implementation of a secure routing protocol based on AODV over IPv6, further reinforced by a routing protocol independent Intrusion Detection System (IDS) for ad hoc networks. Security features in the routing protocol include mechanisms for non-repudiation and authentication, without relying on the availability of a Certificate Authority (CA) or a Key Distribution Center (KDC). We present the design and implementation details of our system, the practical considerations involved, and how these mechanisms can be used to detect and thwart malicious attacks. We discuss several scenarios where the secure routing and intrusion detection mechanisms isolate and deny network resources to nodes deemed malicious.We also discuss shortcomings in our approach, and conclude with lessons learned and ideas for future work.