How to construct random functions
Journal of the ACM (JACM)
Interconnections: bridges and routers
Interconnections: bridges and routers
Integration of security in network routing protocols
ACM SIGSAC Review
MACAW: a media access protocol for wireless LAN's
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Protecting routing infrastructures from denial of service using cooperative intrusion detection
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
How to prove where you are: tracking the location of customer equipment
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Location-aided routing (LAR) in mobile ad hoc networks
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Scenario-based performance analysis of routing protocols for mobile ad-hoc networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
A compact and fast hybrid signature scheme for multicast packet authentication
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Caching strategies in on-demand routing protocols for wireless ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Proceedings of the 7th annual international conference on Mobile computing and networking
Implicit source routes for on-demand ad hoc network routing
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Security-Aware Ad hoc Routing for Wireless Networks
Security-Aware Ad hoc Routing for Wireless Networks
An efficient message authentication scheme for link state routing
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
PGP in constrained wireless devices
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Almost optimal hash sequence traversal
FC'02 Proceedings of the 6th international conference on Financial cryptography
The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Proceedings of the 9th annual conference on Genetic and evolutionary computation
On identifying malicious nodes in ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
A new security scheme for on-demand source routing in mobile ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Surviving attacks on disruption-tolerant networks without authentication
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Mitigating attacks against virtual coordinate based routing in wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
A sense of danger: dendritic cells inspired artificial immune system for manet security
Proceedings of the 10th annual conference on Genetic and evolutionary computation
SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Quantifying Resistance to the Sybil Attack
Financial Cryptography and Data Security
Automated Evaluation of Secure Route Discovery in MANET Protocols
SPIN '08 Proceedings of the 15th international workshop on Model Checking Software
MobiSEC: a novel security architecture for wireless mesh networks
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
The importance of location on trust in mobile networks
WSEAS TRANSACTIONS on COMMUNICATIONS
A cross-layer dropping attack in video streaming over ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Mitigation of the effects of selfish and malicious nodes in ad-hoc networks
WSEAS Transactions on Computers
Securing Layer-2 Path Selection in Wireless Mesh Networks
Information Security Applications
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure network coding for wireless mesh networks: Threats, challenges, and directions
Computer Communications
Private logical neighborhoods for wireless ad hoc networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
BeeAIS: artificial immune system security for nature inspired, MANET routing protocol, BeeADHoc
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Secure and robust virtual coordinate system in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Authenticating DSR using a novel multisignature scheme based on cubic LFSR sequences
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Steel, cast iron and concrete: security engineering for real world wireless sensor networks
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
An efficient RFID solution to expedite services
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
A cluster-based trust-aware routing protocol for mobile ad hoc networks
Wireless Networks
Distributed Automatic Configuration of Complex IPsec-Infrastructures
Journal of Network and Systems Management
Castor: scalable secure routing for ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
SReD: a secure reputation-based dynamic window scheme for disruption-tolerant networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Trust based security in MANET routing protocols: a survey
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments
ACM Transactions on Information and System Security (TISSEC)
Realization of RF distance bounding
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Improving security in WMNs with reputation systems and self-organizing maps
Journal of Network and Computer Applications
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Journal of Network and Computer Applications
A trust-based IDS for the AODV protocol
ICICS'10 Proceedings of the 12th international conference on Information and communications security
A clique-based secure admission control scheme for mobile ad hoc networks (MANETs)
Journal of Network and Computer Applications
Prevention of wormhole attacks in mobile commerce based on non-infrastructure wireless networks
Electronic Commerce Research and Applications
Deciding security for protocols with recursive tests
CADE'11 Proceedings of the 23rd international conference on Automated deduction
Research challenges towards the Future Internet
Computer Communications
BeeHiveGuard: a step towards secure nature inspired routing algorithms
EuroGP'06 Proceedings of the 2006 international conference on Applications of Evolutionary Computing
On fast verification of hash chains
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Review: Security threats and solutions in MANETs: A case study using AODV and SAODV
Journal of Network and Computer Applications
Analysing routing protocols: four nodes topologies are sufficient
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Local key management in opportunistic networks
International Journal of Communication Networks and Distributed Systems
Hash chains at the basis of a secure reactive routing protocol
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Trust evaluation in wireless ad hoc networks using fuzzy system
Proceedings of the CUBE International Information Technology Conference
Secure routing in MANETs using local times
Wireless Networks
Signs of a bad neighborhood: a lightweight metric for anomaly detection in mobile ad hoc networks
Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks
A secure on-demand source routing scheme using hierarchical clustering in mobile ad hoc networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Enhanced dynamic source routing protocol for mitigating black hole attack
International Journal of Wireless and Mobile Computing
OverStar: an open approach to end-to-end middleware services in systems of systems
Proceedings of the 13th International Middleware Conference
Formal analysis of privacy for routing protocols in mobile ad hoc networks
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
Adversarial testing of wireless routing implementations
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Cross-layer metrics for reliable routing in wireless mesh networks
IEEE/ACM Transactions on Networking (TON)
Go with the flow: toward workflow-oriented security assessment
Proceedings of the 2013 workshop on New security paradigms workshop
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks
Mobile Networks and Applications
A proof technique for security assessment of on-demand ad hoc routing protocols
International Journal of Security and Networks
A multi-hop advertising discovery and delivering protocol for multi administrative domain MANET
Mobile Information Systems
Hi-index | 0.01 |
An ad hoc network is a group of wireless mobile computers (or nodes), in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Prior research in ad hoc networking has generally studied the routing problem in a non-adversarial setting, assuming a trusted environment. In this paper, we present attacks against routing in ad hoc networks, and we present the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne. Ariadne prevents attackers or compromised nodes from tampering with uncompromised routes consisting of uncompromised nodes, and also prevents many types of Denial-of-Service attacks. In addition, Ariadne is efficient, using only highly efficient symmetric cryptographic primitives.