Rushing attacks and defense in wireless ad hoc network routing protocols

YC Hu, A Perrig, DB Johnson - Proceedings of the 2nd ACM workshop …, 2003 - dl.acm.org
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each
other, allowing nodes to communicate beyond their direct wireless transmission range …

[PDF][PDF] Secure routing for mobile ad hoc networks.

PG Argyroudis, D O'mahony - IEEE Commun. Surv. Tutorials, 2005 - Citeseer
In this paper we present a survey of secure ad hoc routing protocols for mobile wireless
networks. A mobile ad hoc network is a collection of nodes that is connected through a …

[PDF][PDF] Routing security in ad hoc networks

J Lundberg - Helsinki University of Technology, http://citeseer. nj …, 2000 - Citeseer
The existing ad hoc routing protocols do not accommodate any security and are highly
vulnerable to attacks. We discuss threats and attacks against ad hoc routing under several …

Preventing replay attacks for secure routing in ad hoc networks

J Zhen, S Srinivas - International Conference on Ad-Hoc Networks and …, 2003 - Springer
The design of secure routing techniques is a crucial and challenging requirement in mobile
ad hoc networking. This is due to the fact that the highly dynamic nature of the ad hoc nodes …

Authenticated routing for ad hoc networks

K Sanzgiri, D LaFlamme, B Dahill… - IEEE Journal on …, 2005 - ieeexplore.ieee.org
Initial work in ad hoc routing has considered only the problem of providing efficient
mechanisms for finding paths in very dynamic networks, without considering security …

Secure routing in mobile wireless ad hoc networks

S Gupte, M Singhal - Ad Hoc Networks, 2003 - Elsevier
We discuss several well known contemporary protocols aimed at securing routing in mobile
wireless ad hoc networks. We analyze each of these protocols against requirements of ad …

Ariadne: A secure on-demand routing protocol for ad hoc networks

YC Hu, A Perrig, DB Johnson - Proceedings of the 8th annual …, 2002 - dl.acm.org
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks Page 1 Ariadne: A
Secure On-Demand Routing Protocol for Ad Hoc Networks Yih-Chun Hu Carnegie Mellon …

A survey of secure wireless ad hoc routing

H Yih-Chun, A Perrig - IEEE Security & Privacy, 2004 - ieeexplore.ieee.org
Ad hoc networks use mobile nodes to enable communication outside wireless transmission
range. Attacks on ad hoc network routing protocols disrupt network performance and …

An on-demand secure routing protocol resilient to byzantine failures

B Awerbuch, D Holmer, C Nita-Rotaru… - Proceedings of the 1st …, 2002 - dl.acm.org
An ad hoc wireless network is an autonomous self-organizing system ofmobile nodes
connected by wireless links where nodes not in directrange can communicate via …

Castor: Scalable secure routing for ad hoc networks

W Galuba, P Papadimitratos… - 2010 Proceedings …, 2010 - ieeexplore.ieee.org
Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the
communication of potentially any other node in the network. Many solutions to this problem …