Advertisement

Keywords

Medium Access Control Intrusion Detection Malicious Node Security Mechanism Message Authentication Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Buttyan, L. and Hubaux, J. -P., “Report on a Working Session on Security in Wireless Ad Hoc Networks,” Mobile Computing and Communications Review, 6(4), 2002, pp. 74–94.Google Scholar
  2. [2]
    Yang, H., Luo, H., Ye, F., Lu, S., and Zhang, L., “Security in Mobile Ad Hoc Networks: Challenges and Solutions,” IEEE Wireless Communications Magazine, February 2004, pp. 38–47.Google Scholar
  3. [3]
    Ilyas, M., The Handbook of Ad Hoc Wireless Networks, CRC Press, 2003.Google Scholar
  4. [4]
    Zhou, L. and Haas, Z. J., “Securing Ad Hoc Networks,” IEEE Network Magazine, 13(6), 1999, pp. 24–30.CrossRefGoogle Scholar
  5. [5]
    Gunter Schafer, Security in Fixed and Wireless Networks, John Wiley and Sons, 2003.Google Scholar
  6. [6]
    Siva Ram Murthy, C. and Manoj, B. S., Ad Hoc Wireless Networks: Architectures and Protocols, Prentice Hall Communications Engineering and Emerging Technologies Series, 2004.Google Scholar
  7. [7]
    Feeney, L. M., Ahlgren, B., Westerlund, A., and Dunkels, A., “Spontnet: Experiences in Configuring and Securing Small Ad Hoc Networks,” Fifth International Workshop on Networked Applicances (IWNA5), Liverpool, UK, October 2002.Google Scholar
  8. [8]
    Karpijoki, V., “Security in Ad Hoc Networks,” Tik-110.501 Seminar on Network Security, 2000.Google Scholar
  9. [9]
    Marti, S., Giuli, T., Lai, K., and Baker, M., “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Mobicom’00, Boston, MA, USA, August 2000.Google Scholar
  10. [10]
    Hubaux, J. -P., Buttyan, L., and Capkun, S., “The Quest for Security in Mobile Ad Hoc Networks,” ACM MobiHoc 2001, Long Beach, California, USA, October 2001.Google Scholar
  11. [11]
    Molva, R. and Michiardi, P., “Security in Ad hoc Networks,” Personal Wireless Communications (PWC 2003), Venice, Italy, September 2003.Google Scholar
  12. [12]
    Perrig, A., Hu, Y. -C., and Johnson, D. B., “Wormhole Protection in Wireless Ad Hoc Networks,” Technical Report TR01-384, Department of Computer Science, Rice University.Google Scholar
  13. [13]
    The Keyed-Hash Message Authentication Code (HMAC), No. FIPS 198, National Institute for Standards and Technology (NIST), 2002. http://csrc.nist.gov/publications/fips/index.html.
  14. [14]
    Papadimitratos, P. and Haas, Z., “Secure Routing for Mobile Ad Hoc Networks,” CNDS, 2002.Google Scholar
  15. [15]
    Zapata, M. and Asokan, N., “Securing Ad Hoc Routing Protocols,” ACM WiSe, 2002.Google Scholar
  16. [16]
    Dahill, B., et al., “A Secure Protocol for Ad Hoc Networks,” IEEE ICNP, 2002.Google Scholar
  17. [17]
    Perrig, A., et al., “The TESLA Broadcast Authentication Protocol,” RSA CryptoBytes, 5(2), 2002.Google Scholar
  18. [18]
    Summers, R. C., Secure Computing: Threats and Safeguards, McGraw-Hill, New York, 1996.Google Scholar
  19. [19]
    Sterjev, M. and Gavrilovska, L., “WPS: A Security Protocol for WPAN Networks,” 2003 IEEE Sarnoff Symposium (2003 IEEE SSAWWC), New Jersey, March 2003.Google Scholar
  20. [20]
    Rhee, K. H., Park, Y. H., and Tsudik, G., “A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks,” Journal of Information Science and Engineering, 21, 2005, pp. 415–428.Google Scholar
  21. [21]
    Capkun, S., Hubaux, J. -P., and Buttyan, L., “Self-Organized Public-Key Management for Mobile Ad Hoc networks,” IEEE Transactions on Mobile Computing, 2(1), 2003, pp. 52–64.CrossRefGoogle Scholar
  22. [22]
    Vanhala, A., “Security in Ad-hoc Networks,” Research Seminar on Security in Distributed Systems, Department of Computer Science, University of Helsinki, 2000.Google Scholar
  23. [23]
    Rhee, K. H., Park, Y. H., and Tsudik, G., “An Architecture for Key Management in Hierarchical Mobile Ad-hoc Networks,” Journal of Communications and Networks, 6(2), June 2004, pp. 156–162.Google Scholar
  24. [24]
    Steiner, M., Tsudik, G., and Waidner, M., “CLIQUES: A New Approach to Group Key Agreement,” International Conference on Distributed Computing Systems, 1998.Google Scholar
  25. [25]
    Wong, C., Gouda, M., and Lam, S., “Secure Group Communications using Key Graphs,” ACM SIGCOMM ‘98, 1998.Google Scholar
  26. [26]
    Balenson, D., McGrew, D., and Sherman, A., “Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization,” IETF Internet Draft:draft-balensongroupkeymgmt-oft-00.txt, 1999.Google Scholar
  27. [27]
    Marti, S., Giuli, T., Lai, K., and Baker, M., “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” MOBICOM, 2000.Google Scholar
  28. [28]
    Diffie, W. and Hellman, M., “New Directions in Cryptography,” IEEE Transactions on Information Theory, 1976, pp. 644–654.Google Scholar
  29. [29]
    Buttyan, L. and Hubaux, J. -P., “Nuglets: A Virtual Currency to Stimulate Cooperation in Self-Organized Ad Hoc Networks,” Technical Report DSC/2001/001, Swiss Federal Institute of Technology, Lausanne, 2001.Google Scholar
  30. [30]
    Xu, G. and Iftode, L., “Locality Driven Key Management Architecture for Mobile Ad-hoc Networks,” IEEE MASS 2004, Florida, USA, October 2004.Google Scholar
  31. [31]
    Kong, J., Luo, H., Xu, K., Gu, D. L., Gerla, M., and Lu, S., “Adaptive Security for Multi-level Ad-hoc Networks,” Journal of Wireless Communications and Mobile Computing (WCMC), 2, 2002, pp. 533–547.CrossRefGoogle Scholar
  32. [32]
    Kong, J., Zerfos, P., Luo, H., Lu, S., and Zhang, L., “Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,” ICNP’01, Riverside, California, USA, November 2004.Google Scholar
  33. [33]
    Perkins, C. E., ed., Ad Hoc Networking, Addison-Wesley, 2001.Google Scholar
  34. [34]
    Watts, D., “Small Worlds,” Princeton University Press, 1999.Google Scholar
  35. [35]
    Hoeper, K. and Gong, G., “Models of Authentications in Ad Hoc Networks and Their Related Network Properties,” Technical Report CACR 2004–2003, Centre for Applied Cryptographic Research, University of Waterloo, 2004.Google Scholar
  36. [36]
    IEEE 802.11, Standard Specifications for Wireless Local Area Networks, http://standards.ieee.org/wireless
  37. [37]
    Bluetooth SIG, Specification of the Bluetooth system, Version 1.1; February 22, 2001, available at https://www.bluetooth.com
  38. [38]
    Stajano, F. and Anderson, R., “The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks,” Proceedings of 7th International Workshop on Security Protocols, B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe (eds), LNCS 1796, Springer-Verlag, pp. 172–194, 1999.Google Scholar
  39. [39]
    Eschenauer, L. and Gligor, V. D., “A Key-Management Scheme for Distributed Sensor Networks,” 9th ACM conference on Computer and Communications Security, 2002.Google Scholar
  40. [40]
    Liu, D. and Ning, P., “Location-Based Pairwise Key Establishments for Static Sensor Networks,” 1st ACM Workshop Security of Ad Hoc and Sensor Networks (SASN) ‘03, 2003.Google Scholar
  41. [41]
    Asokan, N. and Ginzboorg, P., “Key Agreement in Ad Hoc Networks,” Computer Communications, 23(17), 2000, pp. 1627–1637.CrossRefGoogle Scholar
  42. [42]
    Weimerskirch, A. and Westhoff, D., “Zero Common-Knowledge Authentication for Pervasive Networks,” Tenth Annual International Workshop on Selected Areas in Cryptography (SAC 2003), 2003.Google Scholar
  43. [43]
    Weimerskirch, A. and Westhoff, D., “Identity Certified Authentication for Ad-Hoc Networks,” 1st ACM workshop on Security of ad hoc and sensor networks (SASN), 2003.Google Scholar
  44. [44]
    Kong, J., Zerfos, P., Luo, H., Lu, S., and Zhang, L., “Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,” International Conference on Network Protocols (ICNP) 2001, 2001.Google Scholar
  45. [45]
    Luo, H., Zerfos, P., Kong, J., Lu, S., and Zhang, L., “Self-Securing Ad Hoc Wireless Networks,” Seventh IEEE Symposium on Computers and Communications (ISCC ‘02), 2002.Google Scholar
  46. [46]
    Khalili, A., Katz, J., and Arbaugh, W., “Toward Secure Key Distribution in Truly Ad-Hoc Networks,” 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), IEEE Computer Society, 2003.Google Scholar
  47. [47]
    Girault, M., “Self-Certified Public Keys,” Advances in Cryptology — EURO-CRYPT ‘91, D. W. Davies (ed.), LNCS 547, Springer-Verlag, 1991, pp. 490–497.Google Scholar
  48. [48]
    Gokhale, S. and Dasgupta, P., “Distributed Authentication for Peer-to-Peer Networks,” Symposium on Applications and the Internet Workshops 2003 (SAINT’03 Workshops), 2003.Google Scholar
  49. [49]
    Balfanz, D., Smetters, D. K., Stewart, P., and Chi Wong, H., “Talking to Strangers: Authentication in Ad-Hoc Wireless Networks,” Network and Distributed System Security Symposium 2002 (NDSS ‘02), 2002.Google Scholar
  50. [50]
    ANSI/IEEE Std 802.11, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Authentication and Privacy,” 1999.Google Scholar
  51. [51]
    IEEE Std. 802.1li/D30, “Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security,” 2002.Google Scholar
  52. [52]
    Anderson, R. and Kuhn, M., “Tamper resistance — a cautionary note,” 2nd USENIX Workshop on Electronic Commerce, 1996.Google Scholar
  53. [53]
    Anderson, R. and Kuhn, M., “Low Cost Attacks on Tamper Resistant Devices,” in Mark Lomas et al., editor, Security Protocols, 5th International Workshop Proceedings, Vol. 1361 of Lecture Notes in Computer Science, Springer-Verlag, 1997, pp. 125–136.Google Scholar
  54. [54]
    Buttyan, L. and Hubaux, J. -P., “Nuglets: A Virtual Currency to Stimulate Cooperation in Self-Organized Ad Hoc Networks,” Technical Report DSC/2001/001, Swiss Federal Institute of Technology, Lausanne, 2001.Google Scholar
  55. [55]
    Yang, H., Meng, X., and Lu, S., “Self-Organized Network-Layer Security in Mobile Ad Hoc Networks,” WiSe ‘02, 2002.Google Scholar
  56. [56]
    Buchegger, S. and Le Boudec, J. -Y., “Performance Analysis of the CONFIDANT Protocol,” MobiHoc ‘02, 2002.Google Scholar
  57. [57]
    Michiardi, P. and Molva, R., “Core: A COllaborative REputation mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks,” IFIP Communication and Multimedia Security Conference, 2002.Google Scholar
  58. [58]
    Zhang, Y. and Lee, W., “Intrusion Detection in Wireless Ad Hoc Networks,” Mobicom’00, Boston, MA, USA, 2000.Google Scholar
  59. [59]
    Wai, F. H., Aye, Y. N., and James, N. H., “Intrusion Detection in Wireless Ad-Hoc Networks,” CS4274 Introduction to Mobile Computing, term paper, Fall 2005, School of Computing, National University of Singapore.Google Scholar
  60. [60]
    Anjum, F., Subhadrabandhu, D., and Sarkar, S., “Intrusion Detection for Wireless Adhoc Networks,” Vehicular Technology Conference, Wireless Security Symposium, Orlando, Florida, October 2003.Google Scholar
  61. [61]
    Patwardhan, A., Parker, J., Joshi, A., Karygiannis, A., and Iorga, M., “Secure Routing and Intrusion Detection in Ad Hoc Networks,” 3rd IEEE International Conference on Pervasive Computing and Communications, Kauaii Island, Hawaii, March 2005.Google Scholar
  62. [62]
    Architecture Technology Corporation. Information available at: http://www.atcorp.com/atcny/
  63. [63]
    Ramanujan, R., Ahamad, A., Bonney, J., Hagelstrom, R., and Thurber, K., “Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA),” MILCOM 2000, Los Angeles, CA, USA, 2000.Google Scholar
  64. [64]
    Brandao, P., Sargento, S., Crisostomo, S., and Prior, R., “Secure Routing in Ad Hoc Networks,” Ad Hoc & Sensor Wireless Networks, 1, 2005.Google Scholar
  65. [65]
    Hu, Y. -C., Johnson, D. B., and Perrig, A., “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,” Ad Hoc Networks, 1, Elsevier, 2003, pp. 3–13.CrossRefGoogle Scholar
  66. [66]
    Dennis, L. S. E. and Xianhe, E., “Study of Secure Reactive Routing Protocols in Mobile Ad Hoc Networks,” CS4274 Term Paper, School of Computing, National University of Singapore.Google Scholar
  67. [67]
    Kotzanikolaou, P., Mavropodi, R., and Douligeris, C., “Secure Multipath Routing for Mobile Ad Hoc Networks,” Second Annual Conference on Wireless On-demand Network Systems and Services (WONS’05), St. Moritz, Switzerland, January 2005.Google Scholar
  68. [68]
    Johnson, D. B. and Maltz, D. A., “Dynamic Source Routing in Ad Hoc Wireless Networks,” in T. Imielinski and H. Korth (eds), Mobile Computing, pp. 153–181. Kluwer Academic Publishers, 1996.Google Scholar
  69. [69]
    Perkins, C. E. and Royer, E. M., “The Ad Hoc On-Demand Distance Vector Protocol,” in C. E. Perkins (ed.), Ad Hoc Networking, pp. 173–219. Addison-Wesley, 2000.Google Scholar
  70. [70]
    Eichler, S., Dotzer, F., Schwingenschlogl, C., Caro, F. J. F., and Eberspacher, J., “Secure Routing in a Vehicular Ad Hoc Network,” IEEE VTC 2004 Fall, Los Angeles, USA, September 2004.Google Scholar
  71. [71]
    Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., and Rubens, H., “ODSBR: An On-Demand Secure Byzantine Routing Protocol,” Technical Report Version 1, The Archipelago Project, October 2003.Google Scholar
  72. [72]
    Burmester, M., Le, T. V., and Weir, M., “Tracing Byzantine Faults in Ad Hoc Networks,” Communication, Network and Information Security — 2003, New York, USA, 2003.Google Scholar
  73. [73]
    Yi, S., Naldurg, P., and Kravets, R., “A Security-Aware Routing Protocol for Wireless Ad Hoc Networks,” 6th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2002), 2002.Google Scholar
  74. [74]
    Perkins, C. E. and Bhagwat, P., “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” Proceedings of SIGCOMM 1994, 1994.Google Scholar
  75. [75]
    Broch, J., Maltz, D. A., Johnson, D. B., Hu, Y. -C., and Jetcheva, J. G., “A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols,” Proceedings of MOBICOM 1998, 1998.Google Scholar
  76. [76]
    Hu, Y. -C., Perrig, A., and Johnson, D. B., “Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks,” Proceedings of MOBICOM 2002, 2002.Google Scholar
  77. [77]
    Deng, H., Li, W., and Agrawal, D. P., “Routing Security in Wireless Ad Hoc Networks,” IEEE Communications Magazine, 40(10), October 2002, pp. 70–75.CrossRefGoogle Scholar
  78. [78]
    Bobba, R., Eschenauer, L., Gligor, V., and Arbaugh, W., “Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks,” Technical Report TR 2002-44, University of Maryland, May 2002.Google Scholar
  79. [79]
    Tseng, Y. -C., Jiang, J. -R., and Lee, J. -H., “Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network,” ICPP Workshop on Wireless Security and Privacy, 2003.Google Scholar
  80. [80]
    Hu, Y. -C., Perrig, A., and Johnson, D. B., “Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks,” INFOCOM 2003, San Francisco, CA, USA, April 2003.Google Scholar
  81. [81]
    Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., and Nygard, K. E., “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks,” International Conference on Wireless Networks, Las Vegas, USA, June 2003.Google Scholar
  82. [82]
    Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., and Rubens, H., “Mitigating Byzantine Attacks in Ad Hoc Wireless Networks,” Technical Report Version 1, Archipelago project, March 2004. Information available at: http://www.cnds.jhu.edu/research/networks/archipelago
  83. [83]
    Papadimitratos, P. and Haas, Z., “Secure Data Transmission in Mobile Ad Hoc Networks,” ACM Workshop on Wireless Security, 2003.Google Scholar
  84. [84]
    Fasbender, A., Kesdogan, D., and Kubitz, O., “Variable and Scalable Security: Protection of Location Information in Mobile IP,” 46th IEEE Vehicular Technology Society Conference, Atlanta, USA, March 1996.Google Scholar
  85. [85]
    Danesh, A. and Inkpen, K., “Collaborating on Ad Hoc Wireless Networks,” Available at: http://www.parc.xerox.com/csl/projects/ubicomp-workshop/positionpapers/danesh.pdf
  86. [86]
    Albers, P., Camp, O., Percher, J. -M., Jouga, B., Me, L., and Puttini, R., “Security in Ad Hoc Networks: A General Intrusion Detection Architecture Enhancing Trust Based Approaches,” 1st International Workshop on Wireless Information Systems (WIS-2002), ICEIS 2002, 4th International Conference on Enterprise Information Systems, Ciudad Real, April 2002.Google Scholar
  87. [87]
    Schmidt, M., “Subsciptionless Mobile Networking: Anonymity and Privacy Aspects Within Personal Area Networks,” IEEE WCNC 2002, 2002.Google Scholar
  88. [88]
    The Archipelago Project, Information available at: http://www.cnds.jhu.edu/research/networks/archipelago
  89. [89]
    Yu, S., Zhang, Y., Song, C., and Chen, K., “A Security Architecture for Mobile Ad Hoc Networks,” Proceedings of Asia-Pacific Advanced Network (APAN), 2004.Google Scholar
  90. [90]
    Wu, X. and Bhargava, B., “Improving Security in Ad Hoc Networks through Integrated Architecture,” 1st NSF/NSA/AFRL Workshop on Secure Knowledge Management, Buffalo, New York, USA, September 2004.Google Scholar
  91. [91]
    Berket, K. and Agarwal, D., “Enabling Secure Ad-hoc Collaboration,” WACE03, Seattle, Washington, USA, June 2003.Google Scholar
  92. [92]
    Lu, Y., Bhargava, B., and Hefeeda, M., “An Architecture for Secure Wireless Networking,” Available at: http://www.cs.purdue.edu/homes/yilu/papers/wireless-sec.pdf
  93. [93]
    Aura, T. and Maki, S., “Towards a Survivable Security Architecture for Ad-Hoc Networks,” Lecture Notes in Computer Science, Springer-Verlag, 2001, pp. 63–73.Google Scholar
  94. [94]
    Bechler, M., Hof, H. -J., Kraft, D., Pahlke, F., and Wolf, L., “A Cluster-Based Security Architecture for Ad Hoc Networks,” IEEE INFOCOM 2004, Hong Kong, March 2004.Google Scholar
  95. [95]
    Molva, R. and Pannetrat, A., “Scalable Multicast Security with Dynamic Recipient Groups,” ACM Transactions on Information and System Security, 3, August 2000, pp. 136–160.CrossRefGoogle Scholar
  96. [96]
    Albers, P., Camp, O., Percher, J. -M., Jouga, B., Me, L., and Puttini, R., “Security in Ad Hoc Networks: A General Intrusion Detection Architecture Enhancing Trust Based Approaches,” 1st International Workshop on Wireless Information Systems (WIS-2002), ICEIS 2002, 4th International Conference on Enterprise Information Systems, Ciudad Real, April 2002.Google Scholar
  97. [97]
    Seys, S., “Security Architecture for Wireless Ad hoc Networks,” Revue HF Tijdschrift 2005(1), 2005.Google Scholar
  98. [98]
    Secure Mobile Networking Project, Portland State University, Information available at: http://www.cs.pdx.edu/research/SMN
  99. [99]
    EPFL Vehicular Networks Security Project, Information available at: http://ivc.epfl.ch
  100. [100]
    SPOT Project, Information available at: http://lcawww.epfl.ch/capkun/spot
  101. [101]
    NIST Mobile Ad Hoc Network Security Project, Information available at: http://csrc.nist.gov/manet
  102. [102]
    IPonAir Project, Information available at: http://www.ccrle.nec.de/Projects/IPonAir.htm
  103. [103]
    Moby Dick Project, IST-2000-25394, Information available at: http://www.istmobydick.org
  104. [104]
    Wrona, K., “Distributed Security: Ad Hoc Networks & Beyond,” PAMPAS Workshop, London, September 2002.Google Scholar
  105. [105]
    Handorean, R. and Roman, G. -C., “Secure Service Provision in Ad Hoc Networks,” Technical Report WUCSE-03-47, Washington University, Department of Computer Science, St. Louis, Missouri, USA, 2003.Google Scholar
  106. [106]
    Eronen, P., Gehrmann, C., and Nikander, P., “Securing Ad Hoc Jini Services,” NordSec2000, Reykjavik, Island, October 2000.Google Scholar

Copyright information

© Springer 2006

Personalised recommendations