Filters








3,130 Hits in 6.1 sec

Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility [article]

Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux
2008 arXiv   pre-print
Neighbor discovery (ND), that is, determining which devices are within direct radio communication, is a building block of network protocols and applications, and its vulnerability can severely compromise  ...  In this paper, we contribute such an analysis: We build a formal model capturing salient characteristics of wireless systems, most notably obstacles and interference, and we provide a specification of  ...  CONCLUSIONS We investigate the problem of secure neighbor discovery (ND) in wireless networks.  ... 
arXiv:0808.2668v1 fatcat:4wgcoboh3ve2zhdnhwmyfydtbq

Secure neighbor discovery in wireless networks

Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
Neighbor discovery (ND), that is, determining which devices are within direct radio communication, is a building block of network protocols and applications, and its vulnerability can severely compromise  ...  In this paper, we contribute such an analysis: We build a formal model capturing salient characteristics of wireless systems, most notably obstacles and interference, and we provide a specification of  ...  CONCLUSIONS We investigate the problem of secure neighbor discovery (ND) in wireless networks.  ... 
doi:10.1145/1368310.1368338 dblp:conf/ccs/PoturalskiPH08 fatcat:4gxlfgcmgbhjvglcwsefp6bgtm

Towards provable secure neighbor discovery in wireless networks

Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux
2008 Proceedings of the 6th ACM workshop on Formal methods in security engineering - FMSE '08  
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocols and a wide range of  ...  Nonetheless, until very recently, there has been no formal analysis of secure ND protocols.  ...  The work presented in this paper was supported (in part) by the National Competence Center in Research on Mobile Information and Communication Systems (NCCR-MICS), a center supported by the Swiss National  ... 
doi:10.1145/1456396.1456400 dblp:conf/ccs/PoturalskiPH08a fatcat:c3xng4yfdvgobigfrk7crwkdmu

Towards Provable Secure Neighbor Discovery in Wireless Networks [article]

Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux
2008 arXiv   pre-print
In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocols and a wide range of  ...  Nonetheless, until very recently, there has been no formal analysis of secure ND protocols.  ...  The work presented in this paper was supported (in part) by the National Competence Center in Research on Mobile Information and Communication Systems (NCCR-MICS), a center supported by the Swiss National  ... 
arXiv:0808.2586v1 fatcat:ujtkkdvukvbs7jg6u6kvk4qpcy

Formal Analysis of Secure Neighbor Discovery in Wireless Networks

Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux
2013 IEEE Transactions on Dependable and Secure Computing  
We develop a formal framework for the analysis of security protocols in wireless networks.  ...  We use this framework to establish general results about the possibility of neighbor discovery. In particular, we show that time-based protocols cannot in general provide secure neighbor discovery.  ...  Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility.  ... 
doi:10.1109/tdsc.2013.17 fatcat:ztykbgrubvfhbdnord2agcl6aq

Neighbor Discovery: Security Challenges in Wireless Ad Hoc and Sensor Networks [chapter]

Mohammad Sayad, Kamal Mohamedpour
2010 Trends in Telecommunications Technologies  
Vijay Varadharajan form Macquarie University and Alireza Mohammadi-nodooshan from K.N.Toosi University of Technology for their scientific support.  ...  Memory 2 Read-Only Memory www.intechopen.com Neighbor Discovery: Security Challenges in Wireless Ad hoc and Sensor Networks www.intechopen.com www.intechopen.comNeighbor Discovery: Security  ...  Based on these definitions, they formally defined security requirements for the four possible groups of neighbor discovery protocols and presented a sample pseudo-code for each group satisfying those set  ... 
doi:10.5772/8469 fatcat:4rhhh5xhgve7fflmfvnwlwehyi

Secure Neighbor Discovery and Ranging in Wireless Networks

Marcin Poturalski
2011
This thesis addresses the security of two fundamental elements of wireless networking: neighbor discovery and ranging.  ...  They are precisely the focus of this thesis. In the first part of the thesis, we contribute a formal analysis of secure communication neighbor discovery protocols.  ...  Contributions In this thesis, we address the security of two fundamental elements of wireless networking: neighbor discovery and ranging.  ... 
doi:10.5075/epfl-thesis-5131 fatcat:i3gowp4nyjgrhpf6dtukknceki

Secure neighborhood discovery: a fundamental element for mobile ad hoc networking

Panos Papadimitratos, Marcin Poturalski, Patrick Schaller, Pascal Lafourcade, David Basin, Srdjan Capkun, Jean-Pierre Hubaux
2008 IEEE Communications Magazine  
Pervasive computing systems will likely be deployed in the near future, with the proliferation of wireless devices and the emergence of ad hoc networking as key enablers.  ...  Coping with mobility and the volatility of wireless communications in such systems is critical.  ...  TOWARDS PROVABLY SECURE NEIGHBORHOOD DISCOVERY Neighborhood discovery (ND) is central to many networking problems, especially in wireless networks with frequently changing topologies, and it enables a  ... 
doi:10.1109/mcom.2008.4473095 fatcat:ymdyqrays5bqxbjfsfnjjaaa2u

Secure Node Discovery in Ad-hoc Networks and Applications

Giovanni Di Crescenzo
2007 Electronical Notes in Theoretical Computer Science  
We formally define correctness, security and efficiency properties of node discovery protocols, and investigate the problem of designing such protocols under appropriate network topology assumptions.  ...  After presenting some secure node discovery protocols, we show their application to secure service architectures in ad-hoc networks.  ...  We then investigate the problem of designing such protocols under appropriate (and as weak as possible) network topology assumptions.  ... 
doi:10.1016/j.entcs.2006.11.014 fatcat:7xzn7xjjajgd7fkap7in4ufvcq

Neighborhood monitoring in ad hoc networks

Axel Krings, Stephan Muehlbacher-Karrer
2010 Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW '10  
Much research in ad hoc networks utilizes monitoring mechanisms to detect maliciously acting nodes.  ...  Specifically, we include collaboration of malicious nodes, the presence of malicious nodes during neighborhood exploration, and misrouting.  ...  CONCLUSIONS This research presented k-hop monitoring as a possible solution to most common packet manipulations in ad hoc networks.  ... 
doi:10.1145/1852666.1852711 dblp:conf/csiirw/KringsM10 fatcat:jxxruvuzxzcj3mxmzzrgb5utmi

Secure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-distribution

Kevin Henry, Douglas R. Stinson
2011 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications  
In this paper we investigate what assumptions are necessary to gather information about the local network topology when adversarial nodes are present and capable of lying about their identity or neighbors  ...  in the network.  ...  Poturalski, Papadimitratos, and Hubaux [8] have given a formal treatment of neighborhood discovery in wireless networks and give an impossibility result for protocols that rely solely on message transmission  ... 
doi:10.1109/lightsec.2011.11 fatcat:quwvx2xftrej3b46o5bro2roti

Security in Ad Hoc Networks [chapter]

Refik Molva, Pietro Michiardi
2003 Lecture Notes in Computer Science  
Wireless security mechanisms in layer 2 that are often considered as part of the solution domain do not meet the specific requirements of wireless ad hoc networks. 3 costs in order to perform some harmful  ...  This paper presents a survey of current research activities dealing with routing security, cooperation enforcement and key management in wireless ad hoc networks.  ...  In case of wireless ad hoc networks as defined in 2 there are two possible scenarios: − managed environments whereby the nodes of the ad hoc network are controlled by an organization and can thus be trusted  ... 
doi:10.1007/978-3-540-39867-7_69 fatcat:klnfyui7zjfcbmxn2ejpk334ai

SECURITY IN AD-HOC NETWORKS

Raja Iswary .
2013 International Journal of Research in Engineering and Technology  
Wireless security mechanisms in layer 2 that are often considered as part of the solution domain do not meet the specific requirements of wireless ad hoc networks. 3 costs in order to perform some harmful  ...  This paper presents a survey of current research activities dealing with routing security, cooperation enforcement and key management in wireless ad hoc networks.  ...  In case of wireless ad hoc networks as defined in 2 there are two possible scenarios: − managed environments whereby the nodes of the ad hoc network are controlled by an organization and can thus be trusted  ... 
doi:10.15623/ijret.2013.0214020 fatcat:lzw5hy2qqncvbpqe3p3j45i77u

Formal reconstruction of attack scenarios in mobile ad hoc and sensor networks

Slim Rekhis, Noureddine Boudriga
2011 EURASIP Journal on Wireless Communications and Networking  
In this article, we propose a formal approach for digital investigation of security attacks in wireless networks.  ...  Several techniques of theoretical digital investigation are presented in the literature but most of them are unsuitable to cope with attacks in wireless networks, especially in Mobile Ad hoc and Sensor  ...  A secure neighbor discovery protocol could be used for that purpose.  ... 
doi:10.1186/1687-1499-2011-39 fatcat:r3bfob7ejndpzmqf725pri5x6q

AD HOC Networks Security [chapter]

Pietro Michiardi, Refik Molva
2005 Mobile Ad Hoc Networking  
In case of wireless ad hoc networks as defined in 2. there are two possible scenarios: • managed environments whereby the nodes of the ad hoc network are controlled by an organization and can thus be trusted  ...  nodes of the network, it is possible to detect anomalies in routing traffic flows in the network.  ... 
doi:10.1002/0471656895.ch12 fatcat:nvyejsdkbvhlrbqr3myxriwdue
« Previous Showing results 1 — 15 out of 3,130 results