scispace - formally typeset
Journal ArticleDOI

Securing AODV: the A-SAODV secure routing prototype

Davide Cerri, +1 more
- 01 Feb 2008 - 
- Vol. 46, Iss: 2, pp 120-125
Reads0
Chats0
TLDR
This article discusses the implementation of the secure AODV protocol extension, which includes tuning strategies aimed at improving its performance, and proposes an adaptive mechanism that tunes SAODV behavior.
Abstract: 
Mobile ad hoc networks pose new kinds of security problems, caused by their nature of collaborative and open systems and by limited availability of resources. In this article, we consider a Wi-Fi connectivity data link layer as a basis and focus on routing security. We discuss our implementation of the secure AODV protocol extension, which includes tuning strategies aimed at improving its performance. Namely, we propose an adaptive mechanism that tunes SAODV behavior. Moreover, we analyze our adaptive strategy and another technique that delays the verification of digital signatures. This article sums up the experimental results we collected in the prototype design, implementation, and tuning.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review

TL;DR: In this article, the authors identified, categorized, and discussed various security challenges and state-of-the-art efforts to resolve these challenges in the Internet of Things (IoT).
Journal ArticleDOI

A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks

TL;DR: A new anomaly-detection scheme based on a dynamic learning process that allows the training data to be updated at particular time intervals and calculating the projection distances based on multidimensional statistics using weighted coefficients and a forgetting curve is proposed.
Journal ArticleDOI

TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks

TL;DR: This paper proposes a trust-aware secure routing framework (TSRF) with the characteristics of lightweight and high ability to resist various attacks and shows with the help of simulations that TSRF can achieve both intended security and high efficiency suitable for WSN-based networks.
Proceedings ArticleDOI

VANET security: Issues, challenges and solutions

TL;DR: This paper represents a literature survey on VANET with primary concern of the security issues and challenges with it.
Proceedings ArticleDOI

An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET

TL;DR: This paper proposes a solution to the black hole attack in one of the most prominent routing algorithm, ad-hoc on demand distance vector (AODV) routing, for the MANETs by using promiscuous mode to detect malicious node (black hole) and propagates the information of malicious node to all the other nodes in the network.
References
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Proceedings ArticleDOI

Ad-hoc on-demand distance vector routing

TL;DR: An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure and the proposed routing algorithm is quite suitable for a dynamic self starting network, as required by users wishing to utilize ad- hoc networks.
Proceedings ArticleDOI

Securing ad hoc routing protocols

TL;DR: In this paper, the authors consider the problem of incorporating security mechanisms into routing protocols for ad hoc networks and develop a security mechanism to protect AODV routing information, which is also applicable to other similar routing protocols and about how a key management scheme could be used in conjunction with the solution.
Journal ArticleDOI

Secure routing for mobile ad hoc networks

TL;DR: The threat model for ad hoc routing is formulated and several specific attacks that can target the operation of a protocol are presented that can provide the basis for future research in this rapidly evolving area.
Journal ArticleDOI

Scalable routing protocols for mobile ad hoc networks

TL;DR: The article compares the scalability properties and operational features of the protocols and discusses challenges in future routing protocol designs.