A survey of routing techniques for mobile communications networks
Mobile Networks and Applications - Special issue: routing in mobile communications networks
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Child-proof authentication for MIPv6 (CAM)
ACM SIGCOMM Computer Communication Review
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Differential Fault Analysis of Secret Key Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
An efficient message authentication scheme for link state routing
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
IEEE Network: The Magazine of Global Internetworking
Key distribution in mobile ad hoc networks based on message relaying
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Hash chains at the basis of a secure reactive routing protocol
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Hi-index | 0.01 |
This paper proposes a key management scheme for MANET (Mobile Ad hoc NETworks) networks that uses asymmetric cryptography without requiring nodes to know the public keys of the other nodes and without requiring any kind of central server or certification authority. In addition, the paper presents a new method ("delayed verification") to reduce the delays in route establishment for distance vector routing protocols in cases where routing messages are signed and need to be verified. It applies both solutions to a MANET distance vector routing protocol: SAODV (Secure AODV), which is an extension of AODV (Ad hoc On-demand Distance Vector routing protocol) that can be used to protect the route discovery mechanism providing security features like integrity and authentication. Finally, the paper presents results from simulations that show how this enhanced SAODV routing protocol provides the same security that the original one with a much more reduced impact in the network performance.