Report on a working session on security in wireless ad hoc networks
- 1 January 2003
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGMOBILE Mobile Computing and Communications Review
- Vol. 7 (1) , 74-94
- https://doi.org/10.1145/881978.882002
Abstract
Most proposed routing protocols for mobile adhoc networks are vulnerable to modification, impersonationand fabrication attacks. The proposed secure rout8 Mobile Computing and Communications Review, Volume 6, Number 4ing protocol, Authenticated Routing for Ad Hoc Networks,prevents such attacks through message authentication, integrityand non-repudiation. Simulation results show thatARAN maintains good network performance while offeringsignificant security advantages over existing...Keywords
This publication has 18 references indexed in Scilit:
- COCAACM Transactions on Computer Systems, 2002
- AriadnePublished by Association for Computing Machinery (ACM) ,2002
- Performance analysis of the CONFIDANT protocolPublished by Association for Computing Machinery (ACM) ,2002
- Protecting AODV against impersonation attacksACM SIGMOBILE Mobile Computing and Communications Review, 2002
- The quest for security in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2001
- The KeyNote Trust-Management System Version 2Published by RFC Editor ,1999
- Securing ad hoc networksIEEE Network, 1999
- TCP Selective Acknowledgment OptionsPublished by RFC Editor ,1996
- Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computersPublished by Association for Computing Machinery (ACM) ,1994
- Protocols for Public Key CryptosystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980