Filters








315 Hits in 5.5 sec

Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks [chapter]

Gergely Ács, Levente Buttyán, István Vajda
2005 Lecture Notes in Computer Science  
In this paper, we propose a framework for the security analysis of on-demand, distance vector routing protocols for ad hoc networks, such as AODV, SAODV, and ARAN.  ...  We demonstrate the approach by representing known and new attacks on SAODV in our framework, and by proving that ARAN is secure in our model.  ...  The second author has been further supported by IKMA and by the Hungarian Ministry of Education (BÖ2003/70).  ... 
doi:10.1007/11601494_10 fatcat:26stpq3cj5ezzipenrycy65pdi

A Clean Slate Approach to Secure Wireless Networking

Jonathan Ponniah, Yih-Chun Hu, P. R. Kumar
2015 Foundations and Trends® in Networking  
As a result, some protocols best fall into hybrid categories such as proactive link state or on-demand distance vector routing.  ...  Abstract The design of secure protocols for wireless ad-hoc networks is an important problem in communication systems research.  ... 
doi:10.1561/1300000037 fatcat:sgv7uboe4zb2xmqmqiw4gtarfq

Countering of Black Hole Attack on Manet with AODV Protocol

Gurwinder Singh
2021 International Journal for Research in Applied Science and Engineering Technology  
Abstract: Security in mobile ad-hoc network (MANET) is the most serious issue impacting performance of network. In general, routing methods is one of the complicated and exciting analysis places.  ...  In this research, performance of one of the most efficient solutions for preventing single black hole attack in MANET using AODV routing protocol will be investigated in terms of packet delivery ratio,  ...  This will help in future designing of security measures. 1.1 Ad-hoc On-demand Distance Vector (AODV) AODV is a kind of reactive protocols. It methodology is hop-to-hop routing.  ... 
doi:10.22214/ijraset.2021.39467 fatcat:3cinwkldprdsfi4au3wvch4qyu

The Hierarchical Threat Model of Routing Security for Wireless Ad Hoc Networks

Guo Xia, Feng Tao, Yuan Zhan-Ting, Ma Jian-Feng
2010 2010 First International Conference on Networking and Distributed Computing  
Lastly, we analyze the security of endairA and ARAN. Both of them are provably secure routing for ad hoc networks in active-n-m attacker model.  ...  Keywords: Ad hoc networks, routing security, the active-n-m attacker model, the hierarchical threat model, provable security.  ...  as DSR [14] etc, On-demand distance vector routing such as AODV [15] etc.  ... 
doi:10.1109/icndc.2010.16 fatcat:ikruba2o3vadln3nf3ss6i2lgm

Vampire Attacks: Wearing Out Life of Wireless Adhoc Sensor Networks

Aruna M.G, Nivedita G Y
2014 IOSR Journal of Computer Engineering  
Ad-hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing.  ...  More security work in this area has focused mainly on denial of service attack at the routing or medium access control levels.  ...  Introduction Ad-hoc wireless sensor networks (WSNs) promise exciting new applications in the near future, such as ubiquitous on-demand computing power, continuous connectivity, and instantly-deployable  ... 
doi:10.9790/0661-16330813 fatcat:x7hdfhqxv5fnxeg2nxm6fhozmm

An on-demand secure routing protocol resilient to byzantine failures

Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru, Herbert Rubens
2002 Proceedings of the ACM workshop on Wireless security - WiSE '02  
We propose an on-demand routing protocol for ad hoc wireless networks that provides resilience to byzantine failures caused by individual or colluding nodes.  ...  An ad hoc wireless network is an autonomous self-organizing system of mobile nodes connected by wireless links where nodes not in direct range can communicate via intermediate nodes.  ...  We would like to thank the Johns Hopkins University Information Security Institute for providing the funding that made this research possible.  ... 
doi:10.1145/570681.570684 dblp:conf/ws/AwerbuchHNR02 fatcat:b2tk6dntejfbndn6hclj3phdmi

Securing Wireless Mesh Networks

Steve Glass, Marius Portmann, Vallipuram Muthukkumarasamy
2008 IEEE Internet Computing  
Wireless mesh networks (WMNs) combine the robustness and performance of conventional infrastructure networks with the large service area and self-organizing and self-healing properties of mobile ad hoc  ...  In this article, the authors consider the problem of ensuring security in WMNs, introduce the IEEE 802.11s draft standard, and discuss the open security threats faced at the network and data-link layers  ...  One common alternative is to use hash chains as introduced in the Secure Ad Hoc On-Demand Distance Vector (SEAD) protocol. 13 Hash chains are efficient and guarantee authenticity and integrity similar  ... 
doi:10.1109/mic.2008.85 fatcat:ancmy2e7wnbmbn2xpb7oon3fia

The IDS for Securing MANET from Packet Dropping Attack

Ghanshyam Rathore, Prof. Ranjeet Osari
2016 International Journal of Engineering Research and  
This work analyzes the effect of packet dropping attack through malicious nodes which is probable attacks in ad hoc networks.  ...  One of these attacks is the packet dropping Attack against network integrity absorbing all data packets in the network.  ...  There is the implementation of the SAODV (secure ad hoc on-demand distance vector routing protocol) and compares the performance of protocol with existing AODV protocol in the presence of black hole attack  ... 
doi:10.17577/ijertv5is030853 fatcat:qtk6yggjurhipi5ucyxrk3whte

Multifold node authentication in mobilead hoc networks

Nikos Komninos, Dimitrios D. Vergados, Christos Douligeris
2007 International Journal of Communication Systems  
Abstract An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected.  ...  In this article we propose a multifold node authentication approach for protecting mobile ad hoc networks.  ...  of the University of the Aegean".  ... 
doi:10.1002/dac.882 fatcat:25g4o7xp7rdnfi5elbjqhj5u4u

Layered security design for mobile ad hoc networks

Nikos Komninos, Dimitris Vergados, Christos Douligeris
2006 Computers & security  
Unlike traditional mobile wireless networks, ad hoc networks rely on individual nodes to keep all the necessary interconnections alive.  ...  In order to identify critical security points in ad hoc networks, it is necessary to examine the security requirements and the types of attacks from the ad hoc network perspective. .  ...  Acknowledgements This work has been partially supported by the Hellenic Ministry of Education and Religious Affairs through "Pythagoras" research project.  ... 
doi:10.1016/j.cose.2005.09.005 fatcat:ymto47fhabgrrce5ojpr5hcfzq

Securing a Wireless World

Hao Yang, F. Ricciato, Songwu Lu, Lixia Zhang
2006 Proceedings of the IEEE  
mobile ad hoc networks.  ...  In this paper, we survey the state-of-the-art approaches to providing security for three popular wireless networking paradigms, namely, IEEE 802.11 based WLANs, third-generation cellular networks, and  ...  The three most popular routing protocols for MANETs are DSDV [36] (proactive, distance vector), AODV [37] (ondemand, distance vector), and DSR [26] (on-demand, source routing). 2) Security Threats  ... 
doi:10.1109/jproc.2005.862321 fatcat:vgfacpwckngavp6df2d4642lei

Vampire Attack Prevention to reduce Node Power Consumption in WSN

Laxmi Choukiker, Amit Saxena, Manish Manoria
2016 International Journal of Computer Applications  
The network performance in presence of IPS is provides secure routing as adequate traditional routing performance.  ...  The evil spirit aggressor information loss existence in presence of IPS is marked zero e.g. the sign of reliable and secures routing.  ...  Afterward we tend to decision route request part exploitation AODV (Ad-hoc on demand distance vector routing) and notice the behaviors of evil spirit and conjointly analyze the energy gain by the evil  ... 
doi:10.5120/ijca2016908031 fatcat:bvd2vdkm55dxhfpabkto5kkg3i

Quantitative Comparative Study of Selected Routing Protocols in MANET based on Security

Bodhy Krishna, C. Chandrasekar
2016 International Journal of Computer Applications  
Ad hoc network is a collection of wireless mobile nodes without any fixed infrastructure.  ...  The network is ad hoc because it does not rely on any pre-existing network infrastructure like routers in wired networks. Such networks have no fixed topology due to the high degree of node mobility.  ...  Here work is more concern about routing in mobile ad hoc networks.  ... 
doi:10.5120/ijca2016908518 fatcat:cglw6uxfgnfktce74jbr6b47ie

Evolution and future directions of the ad hoc on-demand distance-vector routing protocol

Elizabeth M. Belding-Royer, Charles E. Perkins
2003 Ad hoc networks  
The ad hoc on-demand distance-vector (AODV) routing protocol has been designed for use in ad hoc networks, which are presently receiving wide interest within many diverse research communities.  ...  These networks represent a significant departure from traditional wired networks due to the distinguishing characteristics of both the wireless channel and mobile devices.  ...  Our particular on-demand protocol, the ad hoc on-demand distance-vector (AODV) routing protocol, was first proposed in an Internet engineering task force (IETF) Internet draft in fall of 1997.  ... 
doi:10.1016/s1570-8705(03)00016-7 fatcat:cbvijfz4xzgyhg7jae2wnecf7u

Rushing attacks and defense in wireless ad hoc network routing protocols

Yih-Chun Hu, Adrian Perrig, David B. Johnson
2003 Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03  
In this paper, we present the rushing attack, a new attack that results in denial-of-service when used against all previous on-demand ad hoc network routing protocols.  ...  Many proposed routing protocols for ad hoc networks operate in an on-demand fashion, as on-demand routing protocols have been shown to often have lower overhead and faster reaction time than other types  ...  on-demand ad hoc network routing protocols, including protocols that were designed to be secure.  ... 
doi:10.1145/941311.941317 dblp:conf/ws/HuPJ03 fatcat:zz42nmk6svdgtdwead5w42payu
« Previous Showing results 1 — 15 out of 315 results