Secure data transmission in mobile ad hoc networks

P Papadimitratos, ZJ Haas - Proceedings of the 2nd ACM workshop on …, 2003 - dl.acm.org
The vision of nomadic computing with its ubiquitous access has stimulated much interest in
the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly …

Secure data communication in mobile ad hoc networks

P Papadimitratos, ZJ Haas - IEEE Journal on Selected Areas in …, 2006 - ieeexplore.ieee.org
We address the problem of secure and fault-tolerant communication in the presence of
adversaries across a multihop wireless network with frequently changing topology. To …

[PDF][PDF] Securing Mobile Ad Hoc Networks.

P Papadimitratos, ZJ Haas - 2004 - people.kth.se
The vision of nomadic computing with its ubiquitous access has stimulated much interest in
the mobile ad hoc networking (MANET) technology. These infrastructureless, self-organized …

Routing security in ad hoc wireless networks

MO Pervaiz, M Cardei, J Wu - Network security, 2010 - Springer
Wireless networks provide rapid, untethered access to information and computing,
eliminating the barriers of distance, time, and location for many applications ranging from …

Ariadne: A secure on-demand routing protocol for ad hoc networks

YC Hu, A Perrig, DB Johnson - Proceedings of the 8th annual …, 2002 - dl.acm.org
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Page 1 Ariadne: A
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …

A survey of secure wireless ad hoc routing

H Yih-Chun, A Perrig - IEEE Security & Privacy, 2004 - ieeexplore.ieee.org
Ad hoc networks use mobile nodes to enable communication outside wireless transmission
range. Attacks on ad hoc network routing protocols disrupt network performance and …

Bootstrapping security associations for routing in mobile ad-hoc networks

RB Bobba, L Eschenauer, V Gligor… - GLOBECOM'03. IEEE …, 2003 - ieeexplore.ieee.org
To date, most solutions proposed for secure routing in mobile ad-hoc networks (MANETs),
assume that secure associations between pairs of nodes can be established on-line; eg, by …

Secure ad hoc on-demand distance vector routing

MG Zapata - ACM SIGMOBILE Mobile Computing and …, 2002 - dl.acm.org
This article gives an overview of different approaches to provide security features to routing
protocols in mobile ad hoc networks (MANET). It also describes Secure AODV (an extension …

AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks

R Song, L Korba, G Yee - Proceedings of the 3rd ACM workshop on …, 2005 - dl.acm.org
Security, anonymity, and scalability are still important issues for mobile ad hoc network
routing protocols. We first expose the limitations of several existing mobile ad hoc network …

Cryptographic versus trust-based methods for MANET routing security

J Cordasco, S Wetzel - Electronic Notes in Theoretical Computer Science, 2008 - Elsevier
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring
a fixed infrastructure. Early routing protocols for MANETs failed to take security issues into …