A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Filters
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks
[chapter]
2005
Lecture Notes in Computer Science
In this paper, we propose a framework for the security analysis of on-demand, distance vector routing protocols for ad hoc networks, such as AODV, SAODV, and ARAN. ...
We demonstrate the approach by representing known and new attacks on SAODV in our framework, and by proving that ARAN is secure in our model. ...
The second author has been further supported by IKMA and by the Hungarian Ministry of Education (BÖ2003/70). ...
doi:10.1007/11601494_10
fatcat:26stpq3cj5ezzipenrycy65pdi
A Clean Slate Approach to Secure Wireless Networking
2015
Foundations and Trends® in Networking
As a result, some protocols best fall into hybrid categories such as proactive link state or on-demand distance vector routing. ...
Abstract The design of secure protocols for wireless ad-hoc networks is an important problem in communication systems research. ...
doi:10.1561/1300000037
fatcat:sgv7uboe4zb2xmqmqiw4gtarfq
Countering of Black Hole Attack on Manet with AODV Protocol
2021
International Journal for Research in Applied Science and Engineering Technology
Abstract: Security in mobile ad-hoc network (MANET) is the most serious issue impacting performance of network. In general, routing methods is one of the complicated and exciting analysis places. ...
In this research, performance of one of the most efficient solutions for preventing single black hole attack in MANET using AODV routing protocol will be investigated in terms of packet delivery ratio, ...
This will help in future designing of security measures. 1.1 Ad-hoc On-demand Distance Vector (AODV) AODV is a kind of reactive protocols. It methodology is hop-to-hop routing. ...
doi:10.22214/ijraset.2021.39467
fatcat:3cinwkldprdsfi4au3wvch4qyu
The Hierarchical Threat Model of Routing Security for Wireless Ad Hoc Networks
2010
2010 First International Conference on Networking and Distributed Computing
Lastly, we analyze the security of endairA and ARAN. Both of them are provably secure routing for ad hoc networks in active-n-m attacker model. ...
Keywords: Ad hoc networks, routing security, the active-n-m attacker model, the hierarchical threat model, provable security. ...
as DSR [14] etc, On-demand distance vector routing such as AODV [15] etc. ...
doi:10.1109/icndc.2010.16
fatcat:ikruba2o3vadln3nf3ss6i2lgm
Vampire Attacks: Wearing Out Life of Wireless Adhoc Sensor Networks
2014
IOSR Journal of Computer Engineering
Ad-hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. ...
More security work in this area has focused mainly on denial of service attack at the routing or medium access control levels. ...
Introduction Ad-hoc wireless sensor networks (WSNs) promise exciting new applications in the near future, such as ubiquitous on-demand computing power, continuous connectivity, and instantly-deployable ...
doi:10.9790/0661-16330813
fatcat:x7hdfhqxv5fnxeg2nxm6fhozmm
An on-demand secure routing protocol resilient to byzantine failures
2002
Proceedings of the ACM workshop on Wireless security - WiSE '02
We propose an on-demand routing protocol for ad hoc wireless networks that provides resilience to byzantine failures caused by individual or colluding nodes. ...
An ad hoc wireless network is an autonomous self-organizing system of mobile nodes connected by wireless links where nodes not in direct range can communicate via intermediate nodes. ...
We would like to thank the Johns Hopkins University Information Security Institute for providing the funding that made this research possible. ...
doi:10.1145/570681.570684
dblp:conf/ws/AwerbuchHNR02
fatcat:b2tk6dntejfbndn6hclj3phdmi
Securing Wireless Mesh Networks
2008
IEEE Internet Computing
Wireless mesh networks (WMNs) combine the robustness and performance of conventional infrastructure networks with the large service area and self-organizing and self-healing properties of mobile ad hoc ...
In this article, the authors consider the problem of ensuring security in WMNs, introduce the IEEE 802.11s draft standard, and discuss the open security threats faced at the network and data-link layers ...
One common alternative is to use hash chains as introduced in the Secure Ad Hoc On-Demand Distance Vector (SEAD) protocol. 13 Hash chains are efficient and guarantee authenticity and integrity similar ...
doi:10.1109/mic.2008.85
fatcat:ancmy2e7wnbmbn2xpb7oon3fia
The IDS for Securing MANET from Packet Dropping Attack
2016
International Journal of Engineering Research and
This work analyzes the effect of packet dropping attack through malicious nodes which is probable attacks in ad hoc networks. ...
One of these attacks is the packet dropping Attack against network integrity absorbing all data packets in the network. ...
There is the implementation of the SAODV (secure ad hoc on-demand distance vector routing protocol) and compares the performance of protocol with existing AODV protocol in the presence of black hole attack ...
doi:10.17577/ijertv5is030853
fatcat:qtk6yggjurhipi5ucyxrk3whte
Multifold node authentication in mobilead hoc networks
2007
International Journal of Communication Systems
Abstract An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. ...
In this article we propose a multifold node authentication approach for protecting mobile ad hoc networks. ...
of the University of the Aegean". ...
doi:10.1002/dac.882
fatcat:25g4o7xp7rdnfi5elbjqhj5u4u
Layered security design for mobile ad hoc networks
2006
Computers & security
Unlike traditional mobile wireless networks, ad hoc networks rely on individual nodes to keep all the necessary interconnections alive. ...
In order to identify critical security points in ad hoc networks, it is necessary to examine the security requirements and the types of attacks from the ad hoc network perspective. . ...
Acknowledgements This work has been partially supported by the Hellenic Ministry of Education and Religious Affairs through "Pythagoras" research project. ...
doi:10.1016/j.cose.2005.09.005
fatcat:ymto47fhabgrrce5ojpr5hcfzq
Securing a Wireless World
2006
Proceedings of the IEEE
mobile ad hoc networks. ...
In this paper, we survey the state-of-the-art approaches to providing security for three popular wireless networking paradigms, namely, IEEE 802.11 based WLANs, third-generation cellular networks, and ...
The three most popular routing protocols for MANETs are DSDV [36] (proactive, distance vector), AODV [37] (ondemand, distance vector), and DSR [26] (on-demand, source routing). 2) Security Threats ...
doi:10.1109/jproc.2005.862321
fatcat:vgfacpwckngavp6df2d4642lei
Vampire Attack Prevention to reduce Node Power Consumption in WSN
2016
International Journal of Computer Applications
The network performance in presence of IPS is provides secure routing as adequate traditional routing performance. ...
The evil spirit aggressor information loss existence in presence of IPS is marked zero e.g. the sign of reliable and secures routing. ...
Afterward we tend to decision route request part exploitation AODV (Ad-hoc on demand distance vector routing) and notice the behaviors of evil spirit and conjointly analyze the energy gain by the evil ...
doi:10.5120/ijca2016908031
fatcat:bvd2vdkm55dxhfpabkto5kkg3i
Quantitative Comparative Study of Selected Routing Protocols in MANET based on Security
2016
International Journal of Computer Applications
Ad hoc network is a collection of wireless mobile nodes without any fixed infrastructure. ...
The network is ad hoc because it does not rely on any pre-existing network infrastructure like routers in wired networks. Such networks have no fixed topology due to the high degree of node mobility. ...
Here work is more concern about routing in mobile ad hoc networks. ...
doi:10.5120/ijca2016908518
fatcat:cglw6uxfgnfktce74jbr6b47ie
Evolution and future directions of the ad hoc on-demand distance-vector routing protocol
2003
Ad hoc networks
The ad hoc on-demand distance-vector (AODV) routing protocol has been designed for use in ad hoc networks, which are presently receiving wide interest within many diverse research communities. ...
These networks represent a significant departure from traditional wired networks due to the distinguishing characteristics of both the wireless channel and mobile devices. ...
Our particular on-demand protocol, the ad hoc on-demand distance-vector (AODV) routing protocol, was first proposed in an Internet engineering task force (IETF) Internet draft in fall of 1997. ...
doi:10.1016/s1570-8705(03)00016-7
fatcat:cbvijfz4xzgyhg7jae2wnecf7u
Rushing attacks and defense in wireless ad hoc network routing protocols
2003
Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03
In this paper, we present the rushing attack, a new attack that results in denial-of-service when used against all previous on-demand ad hoc network routing protocols. ...
Many proposed routing protocols for ad hoc networks operate in an on-demand fashion, as on-demand routing protocols have been shown to often have lower overhead and faster reaction time than other types ...
on-demand ad hoc network routing protocols, including protocols that were designed to be secure. ...
doi:10.1145/941311.941317
dblp:conf/ws/HuPJ03
fatcat:zz42nmk6svdgtdwead5w42payu
« Previous
Showing results 1 — 15 out of 315 results