Journal ArticleDOI
Securing AODV: the A-SAODV secure routing prototype
Davide Cerri,A. Ghioni +1 more
Reads0
Chats0
TLDR
This article discusses the implementation of the secure AODV protocol extension, which includes tuning strategies aimed at improving its performance, and proposes an adaptive mechanism that tunes SAODV behavior.Abstract:Â
Mobile ad hoc networks pose new kinds of security problems, caused by their nature of collaborative and open systems and by limited availability of resources. In this article, we consider a Wi-Fi connectivity data link layer as a basis and focus on routing security. We discuss our implementation of the secure AODV protocol extension, which includes tuning strategies aimed at improving its performance. Namely, we propose an adaptive mechanism that tunes SAODV behavior. Moreover, we analyze our adaptive strategy and another technique that delays the verification of digital signatures. This article sums up the experimental results we collected in the prototype design, implementation, and tuning.read more
Citations
More filters
Journal ArticleDOI
Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review
TL;DR: In this article, the authors identified, categorized, and discussed various security challenges and state-of-the-art efforts to resolve these challenges in the Internet of Things (IoT).
Journal ArticleDOI
A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks
TL;DR: A new anomaly-detection scheme based on a dynamic learning process that allows the training data to be updated at particular time intervals and calculating the projection distances based on multidimensional statistics using weighted coefficients and a forgetting curve is proposed.
Journal ArticleDOI
TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks
TL;DR: This paper proposes a trust-aware secure routing framework (TSRF) with the characteristics of lightweight and high ability to resist various attacks and shows with the help of simulations that TSRF can achieve both intended security and high efficiency suitable for WSN-based networks.
Proceedings ArticleDOI
VANET security: Issues, challenges and solutions
TL;DR: This paper represents a literature survey on VANET with primary concern of the security issues and challenges with it.
Proceedings ArticleDOI
An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET
Pramod K. Singh,Govind Sharma +1 more
TL;DR: This paper proposes a solution to the black hole attack in one of the most prominent routing algorithm, ad-hoc on demand distance vector (AODV) routing, for the MANETs by using promiscuous mode to detect malicious node (black hole) and propagates the information of malicious node to all the other nodes in the network.
References
More filters
Ad hoc On-Demand Distance Vector (AODV) Routing
TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Proceedings ArticleDOI
Ad-hoc on-demand distance vector routing
C.E. Perkins,E.M. Royer +1 more
TL;DR: An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure and the proposed routing algorithm is quite suitable for a dynamic self starting network, as required by users wishing to utilize ad- hoc networks.
Proceedings ArticleDOI
Securing ad hoc routing protocols
Manel Guerrero Zapata,N. Asokan +1 more
TL;DR: In this paper, the authors consider the problem of incorporating security mechanisms into routing protocols for ad hoc networks and develop a security mechanism to protect AODV routing information, which is also applicable to other similar routing protocols and about how a key management scheme could be used in conjunction with the solution.
Journal ArticleDOI
Secure routing for mobile ad hoc networks
TL;DR: The threat model for ad hoc routing is formulated and several specific attacks that can target the operation of a protocol are presented that can provide the basis for future research in this rapidly evolving area.
Journal ArticleDOI
Scalable routing protocols for mobile ad hoc networks
TL;DR: The article compares the scalability properties and operational features of the protocols and discusses challenges in future routing protocol designs.