• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

DMCA

A Secure Routing Protocol for Ad Hoc Networks (2002)

Cached

  • Download as a PDF

Download Links

  • [signl.cs.umass.edu]
  • [prisms.cs.umass.edu]
  • [www.ece.cmu.edu]
  • [users.ece.cmu.edu]
  • [pompone.cs.ucsb.edu]
  • [pompone.cs.ucsb.edu]
  • [cs.ucsb.edu]
  • [www.cs.ucsb.edu]
  • [www.cs.ucsb.edu]
  • [moment.cs.ucsb.edu]
  • [moment.cs.ucsb.edu]
  • [www.lasr.cs.ucla.edu]
  • [www.cs.georgetown.edu]
  • [www.ists.dartmouth.edu]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Kimaya Sanzgiri , Bridget Dahill , Brian Neil Levine , Clay Shields , Elizabeth M. Belding-Royer
Citations:486 - 0 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Sanzgiri02asecure,
    author = {Kimaya Sanzgiri and Bridget Dahill and Brian Neil Levine and Clay Shields and Elizabeth M. Belding-Royer},
    title = {A Secure Routing Protocol for Ad Hoc Networks},
    year = {2002}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distinct security requirements. We propose a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Our protocol, ARAN, is based on certificates and successfully defeats all identified attacks.

Keyphrases

ad hoc network    secure routing protocol    managed-open scenario    distinct security requirement    identified attack    small amount    different environment    ad hoc routing protocol    recent ad hoc network research    network infrastructure    prior security coordination    security threat   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2018 The Pennsylvania State University