Filters








8,629 Hits in 8.2 sec

The quest for security in mobile ad hoc networks

Jean-Pierre Hubaux, Levente Buttyán, Srdan Capkun
2001 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing - MobiHoc '01  
PROTECTING THE SECURITY MECH- ANISMS } d # b F g ¤ V @ e f b P q s b i © c u x S p i v b @ a u x i 9 R ¤ t ¤ d b f c u x S p i 9 © © Y v X c S 6 c b f c u x i v x e g ¤ b E d b f v X c u i !  ...  The Shortcut Hunter algorithm Evaluation of Shortcut Hunter Dishonest users e t e t " t e g 6 6 F P # 8  ... 
doi:10.1145/501436.501437 fatcat:l3fetya2kbaildr23h7qpan5d4

The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks [chapter]

Mauro Conti, Roberto Di Pietro, Andrea Gabrielli, Luigi Vincenzo Mancini, Alessandro Mei
2009 Lecture Notes in Computer Science  
Node capture is one of the most vexing problems in Ad Hoc network security [18] . In fact, it is a very powerful attack and very hard to detect.  ...  Mobile Ad Hoc networks are subject to some unique security issues that could delay their diffusion. Several solutions have already been proposed to enforce specific security properties.  ...  Section 3 describes our approach for the node capture detection in Mobile Ad Hoc networks.  ... 
doi:10.1007/978-3-642-02118-3_8 fatcat:pegm53cyajdeldfwq7hf4co434

SECRET: A secure and efficient certificate revocation scheme for Mobile Ad hoc Networks

Dieynaba Mall, Karim Konate, Al-Sakib Khan Pathan
2014 2014 International Symposium on Biometrics and Security Technologies (ISBAST)  
The intent of this paper is to propose an enhanced certificate revocation scheme for Mobile Ad hoc Networks (MANETs). Our approach is built on mainly two previously proposed mechanisms.  ...  We prove the efficiency of our approach by performance analysis. Also, we present the security analysis that shows clear gains than the previously proposed schemes. © 2014 IEEE.  ...  The quest for security in mobile ad hoc networks Toward secure key distribution in truly ad-hoc networks URSA: Ubiquitous and robust access control for mobile ad hoc networks Cited 183 times View at Publisher  ... 
doi:10.1109/isbast.2014.7013110 dblp:conf/isbast/MallKP14 fatcat:zrlahbosmfhcvmhmlfeph37jva

Authentication Based on Multilayer Clustering in Ad Hoc Networks

Keun-Ho Lee, Sang-Bum Han, Heyi-Sook Suh, Sang Keun Lee, Chong-Sun Hwang
2005 EURASIP Journal on Wireless Communications and Networking  
In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks.  ...  Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN), designs an end-to-end authentication protocol that relies on mutual trust between nodes in other  ...  work for securing ad hoc networks in Section 2.  ... 
doi:10.1155/wcn.2005.731 fatcat:2i6rrsrcyba5da4dayhddxlblu

Energy Efficient Forwarding Scheme for Secure Wireless Ad Hoc Routing Protocols [chapter]

Kwonseung Shin, Min Young Chung, Hyunseung Choo
2007 Lecture Notes in Computer Science  
Securing the ad hoc routing protocol is necessary to prevent attacks in these applications.  ...  However, securing protocols for mobile ad hoc networks presents challenges due to energy consuming processes such as authentication of hosts and verification of messages.  ...  Authenticated Routing for Ad Hoc Networks (ARAN) [6] is a secure ad hoc routing protocol using the CA. Initially each node receives a certificate, and public key of the CA, from the CA securely.  ... 
doi:10.1007/978-3-540-72590-9_72 fatcat:4b63zykeuzbgxkqp6h5lqnlpga

Secure Routing in Mobile Ad hoc Network

2018 Sukkur IBA Journal of Computing and Mathematical Sciences  
Due to the mobility of the nodes and no infrastructure mobile ad hoc network can be used in disaster and emergency situations.  ...  MANET is a wireless ad-hoc network which includes mobile nodes. In MANET mobile refers to the movable nodes which can change their location frequently.  ...  Security Attributes of MANET Following are the some attributes for ensuring the security of the mobile ad-hoc network [7] . 1.  ... 
doi:10.30537/sjcms.v2i2.70 fatcat:kovcolaxnreotiqebev6ffl2nu

Towards Hovering Information [chapter]

Alfredo Villalba, Dimitri Konstantas
2006 Lecture Notes in Computer Science  
Information hovers from one mobile device to another, in a quest to remain within a specific vicinity and avail itself to users currently present or entering its anchoring geographical location..  ...  In this paper, we lay the foundations and research questions of a new paradigm for sharing information which we term Hovering Information (HoverInfo).  ...  In this context, mobile devices set up mobile ad hoc network for exchanging information as people move around and interact.  ... 
doi:10.1007/11907503_25 fatcat:lklf7y7gtzfypjutyhdd4cxzce

Secure Route Discovery Protocol for Ad Hoc Networks

Y. PARK, H. SONG, K. LEE, C. KIM, S. LEE, S. MOON
2007 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
A secure and efficient route discovery protocol is proposed for ad hoc networks, where only one-way hash functions are used to authenticate nodes in the ROUTE REQUEST, while additional publickey cryptography  ...  is used to guard against active attackers disguising a node in the ROUTE REPLY.  ...  route discovery protocol for ad hoc networks.  ... 
doi:10.1093/ietfec/e90-a.2.539 fatcat:nm2p3i377bhidd4teg3y6ve7me

Trust Establishment in Mobile Ad Hoc Networks: Direct Trust Distribution-Performance and Simulation [chapter]

Dawoud D.S., Richard L., Ashraph Suliman, Kasmir Raja
2011 Mobile Ad-Hoc Networks: Protocol Design  
Secure routing in mobile ad hoc networks A mobile ad hoc network's routing protocol has unique challenges due to the dynamic nature of ad hoc network.  ...  Presenting a novel security solution for mobile ad hoc networks.  ... 
doi:10.5772/16226 fatcat:sbqpgsved5ewtaw7l3lsioam4a

Rushing attacks and defense in wireless ad hoc network routing protocols

Yih-Chun Hu, Adrian Perrig, David B. Johnson
2003 Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03  
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range.  ...  In this paper, we present the rushing attack, a new attack that results in denial-of-service when used against all previous on-demand ad hoc network routing protocols.  ...  INTRODUCTION An ad hoc network is a collection of mobile computers (or nodes) that cooperate to forward packets for each other to extend the limited transmission range of each node's wireless network interface  ... 
doi:10.1145/941315.941317 fatcat:holifgwonrhbdp6f7jzy77bnim

Rushing attacks and defense in wireless ad hoc network routing protocols

Yih-Chun Hu, Adrian Perrig, David B. Johnson
2003 Proceedings of the 2003 ACM workshop on Wireless security - WiSe '03  
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range.  ...  In this paper, we present the rushing attack, a new attack that results in denial-of-service when used against all previous on-demand ad hoc network routing protocols.  ...  INTRODUCTION An ad hoc network is a collection of mobile computers (or nodes) that cooperate to forward packets for each other to extend the limited transmission range of each node's wireless network interface  ... 
doi:10.1145/941311.941317 dblp:conf/ws/HuPJ03 fatcat:zz42nmk6svdgtdwead5w42payu

An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks

Xia Wang, Johnny Wong
2007 Computer Software and Applications Conference (COMPSAC) Proceedings of the IEEE International  
Wormhole attack is a severe attack in wireless ad-hoc networks.  ...  In this article, we propose an end-to-end detection of wormhole attack (EDWA) in wireless ad-hoc networks.  ...  Main design of EDWA In some routing protocols of wireless ad hoc networks, for example, AODV [19] and DSR [14] , the source node first initiates a routing discovery by broadcasting a ROUTE RE-QUEST packet  ... 
doi:10.1109/compsac.2007.63 dblp:conf/compsac/WangW07 fatcat:ka23bus2e5cf7cqfsi3qcsh4i4

Manets Trust Based Data Security and Secure Anonymous Routing

2019 International journal of recent technology and engineering  
For express employments of the mobile ad hoc networks (MANETs) sent during opponent conditions, unidentified correspondences through data overwhelm with expectedness is goliath.  ...  In this work a bound together trust the board plan has been hardened with AASR protocol in order to upgrade the routing and data security in MANETs.  ...  Fig1.1: Mobile Ad hoc Network B. MANET SECURITY Beginning late mobile ad hoc networks (MANETs) have gotten tremendous idea in light of their self-structure and self-upkeep limits.  ... 
doi:10.35940/ijrte.d9960.118419 fatcat:gwlaabe33vfdnld3mkcxjkcd4q

Dual Authentication Hashing for Security Enhancement in MANET

L. Raja, Dr. P. S. Periasamy
2016 Circuits and Systems  
Mobile Ad hoc Network (MANET) is a collection of mobile hosts with wireless interfaces that form a temporary network without the aid of any fixed infrastructure or centralized administration.  ...  The dynamic and cooperative behaviour of ad hoc networking without any centralized or unified controlling authority for authentication and monitoring is sensitive to attacks that damage or exploit the  ...  The nature of mobile ad hoc networks poses a wide range of threats to the security.  ... 
doi:10.4236/cs.2016.74030 fatcat:thxesrdcxzgudln6linu2yg7bu

A public key management scheme and threshold-multisignature scheme for mobile ad hoc networks

J. van der Merwe, D.S. Dawoud, S. McDonald
2006 SAIEE Africa Research Journal  
This addresses the major problem in providing key management services lor mobile ad hoc networks, without compromising security.  ...  key management schemes lor mobile ad hoc networks, This paper proposes a I!  ...  eharacteristics of mobile ad hoc networks make the design of feasible security mechanisms a challenging quest.  ... 
doi:10.23919/saiee.2006.9488029 fatcat:3o7kdtlhqngkbifn7w4azd22nq
« Previous Showing results 1 — 15 out of 8,629 results