IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
One Way Hash Functions and DES
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Efficient protocols secure against guessing and replay attacks
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
SRDP: Securing Route Discovery in DSR
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
Secure and efficient key management in mobile ad hoc networks
Journal of Network and Computer Applications
Ad hoc network routing and security: A review: Research Articles
International Journal of Communication Systems
Secure routing for mobile ad hoc networks
IEEE Communications Surveys & Tutorials
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
The advantages of elliptic curve cryptography for wireless security
IEEE Wireless Communications
Routing security in wireless ad hoc networks
IEEE Communications Magazine
Wormhole attacks in wireless networks
IEEE Journal on Selected Areas in Communications
Hash chains at the basis of a secure reactive routing protocol
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Hi-index | 0.00 |
Mobile ad hoc networks (MANETs) are a collection of wireless mobile nodes dynamically forming a local area network or other temporary network without using any existing network infrastructure or centralized administration. Because all of the nodes communicate each other based on the routing protocol, and an attacker could manipulate a lower-level protocol to interrupt a security mechanism in a higher-level one, securing routing protocol is an important issue in MANETs. Recently, there exist several proposals that attempt to architect a secure routing protocol for MANETs. Ariadne is the flagship protocol for securing the dynamic source routing protocol, and it can defend against the alteration of route message and prevent various types of Denial of Service attacks. Unfortunately, in 2006 Acs et al. stated Ariadne will suffer from a new attack, and proposed a provably secure on-demand source routing protocol, called ENDAIRA, against such an attack. However, their method is not actually secure against the Sybil and wormhole attacks. Therefore, in this paper we design a secure routing scheme using the self-certified public key cryptosystem, elliptic curve cryptosystem, pre-hashing, and nonce techniques against such attacks in ENDAIRA. Finally, we analyze the security and discuss the superiority about our proposed scheme.