Results 1 - 10
of
17
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
, 2003
"... An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous ad hoc network routing protocols have been based in part on distance vec ..."
Abstract
-
Cited by 534 (8 self)
- Add to MetaCart
operations in the protocol. SEAD performs well over the range of scenarios we tested, and is robust against multiple uncoordinated attackers creating incorrect routing state in any other node, even in spite of any active attackers or compromised nodes in the network.
From STEM to SEAD: Speculative Execution for Automated Defense
- In USENIX Annual Technical Conference. USENIX
, 2007
"... Most computer defense systems crash the process that they protect as part of their response to an attack. Although recent research explores the feasibility of selfhealing to automatically recover from an attack, selfhealing faces some obstacles before it can protect legacy applications and COTS (Com ..."
Abstract
-
Cited by 18 (1 self)
- Add to MetaCart
to provide practical speculative execution for automated defense (SEAD). First, STEM is now applicable to COTS software: it does not require source code, and it imposes a roughly 73 % performance penalty on Apache’s normal operation. Second, we introduce repair policy to assist the healing process
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks
"... Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of a centralized access point. Secure Efficient Ad hoc Distance Vector (SEAD) is a proactive routing protocol, based on the design of Destination Sequenced Distance Vector r ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of a centralized access point. Secure Efficient Ad hoc Distance Vector (SEAD) is a proactive routing protocol, based on the design of Destination Sequenced Distance Vector
A Novel method to Detect Black Hole attack in MANET using Efficient ACO Strategy for SEAD Protocol
"... It is highly essential to ensure security for data transmission. Number of such work is going on to ensure secure data transmission. Due to the high growth usage of mobile in this era, it is highly essential to make use of secure mechanism in mobile. Besides the advent growth of mobile there is also ..."
Abstract
- Add to MetaCart
there is also a parallel growth of threats. In order to provide better performance in the mobile architecture this work ensures security for mobile nodes. Every Mobile node is liable to attack. Such nodes were declared as malicious node. This work will provide efficient strategy to fight against threats like
Performance Investigation and Analysis of Secured MANET Routing Protocols
"... Abstract — In this research proposal, we present attacks against routing in ad hoc networks, and we present the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne. Ariadne prevents attackers or compromised nodes from tampering with uncompromis ..."
Abstract
- Add to MetaCart
Abstract — In this research proposal, we present attacks against routing in ad hoc networks, and we present the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne. Ariadne prevents attackers or compromised nodes from tampering
An Intelligent Agent for Supervisory Control of Teams of unihabited Combat Air Vehicles (UCAVs)
, 2000
"... This paper describes a decision aid called OLIPSA (On-Line Intelligent Processor for Situation Awareness), which was originally developed for advanced fighter aircraft cockpit displays, but has recently been extended to supervisory control of UCAVs performing Suppression of Enemy Air Defense (SEAD) ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
This paper describes a decision aid called OLIPSA (On-Line Intelligent Processor for Situation Awareness), which was originally developed for advanced fighter aircraft cockpit displays, but has recently been extended to supervisory control of UCAVs performing Suppression of Enemy Air Defense (SEAD
Scenario Based Performance Evaluation of Secure Routing in MANETs,” 3rd presentation
- 2nd International Workshop on Mobile Ad Hoc Networks and Interoperability Issues (MANETII’05), in conjunction with the International Conference on Wireless Networks (ICWN’05), Las Vegas, NV
, 2005
"... Security in MANETs is of prime importance in several scenarios of deployment such as battlefield, event coverage, etc. The traditional non-secure routing protocols for MANETs fail to prevent against attacks such as DoS, spoofing and cache poisoning. One of the primary goals of designing secure routi ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
routing protocols is to prevent the compromised nodes in the network from disrupting the route discovery and maintenance mechanisms. However, this added security comes at the cost of performance. In this paper we evaluate the performance of SEAD, a secure routing protocol based upon the proactive DSDV
Evaluation of QoS Metrics in Ad Hoc Networks with the use of Secure Routing Protocols
"... An Ad Hoc network is formed by mobile computers (nodes) with wireless interfaces that communicate amongst themselves without the help of any infrastructure. Due to their characteristics, the Ad Hoc networks are prone to the presence of malicious nodes that can degrade your performance. This fact mot ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
motivated the appearance of security protocols that implement mechanisms to avoid attacks like DoS. In this article is accomplished a verification the impact caused in the performance of the Ad Hoc networks with the use of security protocols (SEAD and Ariadne) in relation to the use of protocols that don
Comparing secure routing protocols
"... Abstract- Security has gained a lot of importance in mobile ad-hoc network. It is difficult to design secure ad hoc network routing protocols due to the highly dynamic nature of adhoc network and due to the need to operate efficiently with limited resources. This paper presents a performance compari ..."
Abstract
- Add to MetaCart
comparison of various secure routing protocols named SAODV,SEAD and SDART.These protocols provide security to different routing protocols such as AODV,DSDV and DART.The simulation results are done in order to choose the best secure routing protocol to give the highest performance when implement the secure
SECURING ROUTE DISCOVERY IN MAODV FOR WIRELESS SENSOR NETWORKS
"... The deployment of sensor networks for security and safety related environments requires securing communication primitives such as broadcast, multicast and point to point communication. Recent research shows that multicast provides high energy saving in IP supported wireless sensor networks (WSN). I ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
). In this work, we investigate how to secure route discovery of the Multicast Ad-hoc on Demand Distance Vector (MAODV) protocol for WSNs. For the ad-hoc networks ARIADNE, SEAD, ARAN are some of the solutions, which cannot be directly applied to energy constrained WSNs. Here, we propose a secure route discovery
Results 1 - 10
of
17