BISS: Building secure routing out of an Incomplete Set of Security associations
|
|
- Sara Marsha Daniel
- 6 years ago
- Views:
Transcription
1 BISS: Building secure routing out of an Incomplete Set of Security associations Srdjan Čapkun and Jean-Pierre Hubaux Secure routing in ad hoc networks - Common assumptions for secure routing: - a network controlled by a central authority - nodes or the authority generate keys - the authority controls network security settings and membership - legitimate nodes can authenticate each others messages - All pairs of nodes share secret keys, know each others public or TESLA keys or can authenticate each others messages. - Routes are established through nodes which can be authenticated (and trusted) by the sender and the receiver. i j 2
2 Secure routing and key management in ad hoc networks We study two related problems: - Devising a key management/key establishment scheme that enables an efficient and dependable node, message authentication and other security features. - Proposing a secure routing protocol that can efficiently work with the proposed key management/key establishment schemes. 3 Security associations - Two nodes have established a security association if - the nodes share a secret key - the nodes hold each others authentic public or TESLA keys - In a broader sense, we assume that two nodes have established a security association if the nodes can authenticate each others messages 4
3 Secure routing requirements and assumptions - Required: Security associations established between all pairs of nodes prior to routing protocol execution - The most stringent assumption: Routes are established through nodes with which a source and the destination have security associations i m j Secure routing proposals - Securing Ad Hoc Routing Protocols, Zappata, Asokan, WiSe, Ariadne, Hu, Perrig, Johnson, MobiCom Secure Routing for Ad Hoc Networks, Papadimitratos, Haas CNDS, A Secure Routing Protocol for Ad Hoc Networks, Sanzgiri et al. ICNP, SEAD, Hu, Perrig, Johnson, WMCSA Solutions for key management and key establishment proposed so far Providing. Robust and Ubiquitous Security Support for MANETs (threshold cryptography, cooperation) UCLA: Kong et al., ICNP 200, TON 2002 Key Agreement in Ad Hoc Networks (shared password) Asokan and Ginzboorg, Computer Communications 2000 Securing Ad Hoc Networks (999) (threshold cryptography, servers) Cornell: Zhou and Haas, IEEE Network 999 Ariadne (Key distribution with on-line servers) Hu et al., Mobicom 2002 Self-organized Public-Key Management for Mobile Ad Hoc Networks (certificate chains) EPFL: Capkun, Buttyan, Hubaux, TMC 2003 SUCV (Montenegro and Castelluccia) NDSS 2002 CAM (O'Shea and Roe) ACM Computer Communications Review 200 Mobility Helps Peer-to-Peer Security EPFL: Capkun, Hubaux, Buttyan MobiHoc 2003 (mobility based approach) A key management scheme for distributed sensor networks Eschenauer, Gligor, ACM CCS 2003 Random Key Predistribution Schemes for Sensor Networks Chan, Perrig, Song, IEEE Symposium on Security and Privacy 2003 (random key predistribution) 6
4 Routing security interdependence Routing can not work until security associations are set up. Security associations can not be set up via multi-hop routes because routing does not work i j Existing solutions: - Preloading keys into nodes (probabilistic or deterministic) - On-line authentication servers - The establishment of security associations by using mobility - CAM, SUCV 7 Incomplete set of security associations - Key management/key establishment schemes do not necessarily result in a complete set of security associations (every node does not establish security associations with all other nodes in the network, but only with a fraction) Solutions based on - Threshold cryptography - Mobility - User involvement - Probabilistic pre-distribution may result with an incomplete set of security associations U Additional causes of an incomplete set of security associations: Unavailability of servers Mobility Re-keying 8
5 Mobility helps security of routing - Each node holds a certificate that bind its id with its public key, signed by the CA A σ PuKCA { A, PuK A } σ PuKCA { B, PuK B } B Certificate that binds B s Public key with his id, issued and signed by the central authority Wireless channel - No integrity - No confidentiality 9 Routing in an incomplete set of security associations Direct route authentication (Ariadne) Authenticate U, V and T I RREQ RREPLY, MAC(V,I),MAC(U,I) U RREQ, MAC(U,T) V RREPLY, MAC(V,I) RREQ, MAC(U,T), MAC(V,T) RREPLY T Authenticate I, U and V Both the initiator and the target authenticate all the nodes on the route directly through previously established security associations. Here, the security associations are established through TESLA keys which are distributed via a key distribution protocol 0
6 Routing in an incomplete set of security associations Indirect route authentication (BISS) Authenticate U, V and T Establish security associations with U, V and T I RREQ RREPLY, CERT(T)(V)(U) U RREQ, MAC(U,T) V RREPLY, CERT(T)(V) RREQ, MAC(U,T), MAC(V,T) RREPLY, CERT(T) T Authenticate I, U and V The target authenticates the nodes directly through MACs, while the initiator authenticates the nodes indirectly through certificate exchange (CERTs). BISS security Due to its similarity with ARIADNE, BISS maintains the same security level as ARIADNE BISS protects from - External attacks (malicious nodes) - passive (strong encryption). - active (mutual authentication). - Single compromised node. But does not prevent all attacks from - Multiple Compromised nodes - Single compromised and multiple malicious nodes (controlled by the same attacker) 2
7 BISS performance analysis Secure routing capability c θ s c = θ Secure routing length ratio r Fraction of pairs of nodes between which there exists a secure route. Fraction of pairs of nodes between which there exists a route. r = U,V S d(u,v) s d(u,v) S Length of shortest secure route between U and V. Length of shortest route between U and V. Set of all pairs of nodes between which there exists a route and a secure route. 3 Simulation scenario Both capability c and length ratio r depend on: Deployment area dimensions dxd. Node density λ. Power range R. Percentage p of security associations. Simulation parameters: d = 000m. λ = (00, 50 and 200), uniformly distributed. R = 50m. We will observe: c and r as a function of p (randomly distributed) (confidence. Int. of 95%) 4
8 Direct route authentication vs. BISS secure routing capability secure routing capability c percentage of security associations p secure routing capability c percentage of security associations p n = 00 n = 50 n = 200 n = 00 n = 50 n = 200 Direct route authentication BISS 5 Direct route authentication vs. BISS secure routing length ratio secure routing length ratio r percentage of security associations p n = 00 n = 50 n = 200 secure routing length ratio r percentage of security associations p n = 00 n = 50 n = 200 Direct route authentication BISS 6
9 Critical density p= p= p= p= p=0.8 p= node density λ BISS secure routing capability as a function of λ 7 BISS performance discussion - BISS enables secure routing in networks where only 40% security associations are established. - The establishment of 40% of security associations with a Mobility based approach (Capkun, Hubaux, Buttyan, MobiHoc 2003), for 400 nodes/km 2 with an average speed of 2.5m/s, and the power range of 50 m and random waypoint takes around 7 min. - Furthermore, with BISS, the more the nodes are able to route, more security associations will be established (BISS helps to establish new security associations) - Jointly, BISS and Mobility based establishment of security associations turn security-routing dependency into a virtues circle of efficient routing and fast establishment of security associations. - BISS does not add to the communication overhead 8
10 Conclusion Conclusion and future work An incomplete set of security associations is a consequence of the dynamic nature of ad hoc networks Secure routing is possible even if only a fraction of pairs of nodes have security associations established between them Security of routing with an incomplete set of security associations is not reduced BISS protocol enables routing in networks with an incomplete set of security associations and helps with establishing new security associations BISS turns a routing security interdependence into a virtuous circle Current/future work Simulate the pace at which BISS helps to establish new security associations Proposing the implementation of BISS with only symmetric crypto (TESLA) Investigating other secure routing protocols in networks with an incomplete set of security associations 9
Mohammad Hossein Manshaei
Mohammad Hossein Manshaei manshaei@gmail.com Instructor: Mohammad Hossein Manshaei Course web page available at IUT Web Course (http://ivut.iut.ac.ir/bounce.php?course=765) Slides Ebook Miniprojects Any
More informationKey establishment in sensor networks
Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ key types; establishment of link keys using a shortterm master key; random key predistribution: - the basic scheme, and - some improvements;
More informationChapter 4: Naming and addressing
Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ attacks against naming and addressing: - address stealing - Sybil attack - node replication attack; protection mechanisms: - Cryptographically
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #11 Routing and Forwarding Security 2015 Patrick Tague 1 Class #11 Basics of routing in ad hoc networks Control-plane attacks and defenses Data-plane
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #12 Routing Security; Forwarding Security 2016 Patrick Tague 1 SoW Presentation SoW Thursday in class I'll post a template Each team gets ~5 minutes
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #11 Control-Plane Routing Misbehavior Agenda Control-Plane Routing Misbehavior MANET Routing Misbehavior at the control-plane Toward secure
More informationCooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness
Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness Sonja Buchegger IBM Research, Zurich Research Laboratory CH-8803 Rüschlikon, Switzerland sob@zurich.ibm.com
More informationAn On-demand Secure Routing Protocol Resilient to Byzantine Failures. Routing: objective. Communication Vulnerabilities
An On-demand Secure Routing Protocol Resilient to Byzantine Failures Baruch Awerbuch Johns Hopkins University On-Demand vs. Proactive Routing Security Concerns On-Demand Source Authentication Caching presents
More informationThe Effects of Probabilistic Key Management on Secure Routing in Sensor Networks Patrick Traynor, Guohong Cao and Tom La Porta Penn State University
1 The Effects of Probabilistic Key Management on Secure Routing in Sensor Networks Patrick Traynor, Guohong Cao and Tom La Porta Penn State University Abstract Secure data dissemination is a necessary
More informationAn On-demand Secure Routing Protocol Resilient to Byzantine Failures
An On-demand Secure Routing Protocol Resilient to Byzantine Failures Baruch Awerbuch Johns Hopkins University Joint work with David Holmer, Cristina Nita-Rotaru, and Herbert Rubens Based on paper at WiSe2002
More informationChord-based Key Establishment Schemes for Sensor Networks
Chord-based Key Establishment Schemes for Sensor Networks Fan Zhang, Zhijie Jerry Shi, Bing Wang Department of Computer Science and Engineering, University of Connecticut, Storrs, CT 06269 Abstract Because
More informationSecure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks
Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks Masroor Ali 1, Zahid Ullah 2, Meharban Khan 3, Abdul Hafeez 4 Department of Electrical Engineering, CECOS University of IT and Emerging
More informationPerformance Investigation and Analysis of Secured MANET Routing Protocols
Performance Investigation and Analysis of Secured MANET Routing Protocols A.Jayanand #, Prof.Dr.T.Jebarajan * # Principal, Maria Polytechnic College,Attoor, India (Research scholar, MSU) * Principal, Kings
More informationEnhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal *
Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal * SCOE, Pune University Prof. J. B. Kulkarni SCOE, Pune University Abstract Security is the main issue while setting
More informationA Security Infrastructure for Trusted Devices
Infrastructure () A Security Infrastructure for Trusted Devices Mahalingam Ramkumar Mississippi State University, MS Nasir Memon Polytechnic University, Brooklyn, NY January 31, 2005 Infrastructure ()
More informationManagement Science Letters
Management Science Letters 2 (2012) 2271 2280 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl A new method for improving security in MANETs AODV
More informationReliable Broadcast Message Authentication in Wireless Sensor Networks
Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric
More informationKey Distribution in Mobile Ad Hoc Networks based on Message Relaying
Key Distribution in Mobile Ad Hoc Networks based on Message Relaying Johann van der Merwe, Dawoud Dawoud, and Stephen McDonald University of KwaZulu-Natal, School of Electrical, Electronic and Computer
More informationSecure Routing and Transmission Protocols for Ad Hoc Networks
MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks
More informationAODV Routing Protocol in MANET based on Cryptographic Authentication Method
IJCSET October 2012 Vol 2, Issue 10, 1459-1464 www.ijcset.net ISSN:2231-0711 AODV Routing Protocol in MANET based on Cryptographic Authentication Method Thandu Naga Srinu Padma CSE,Sri Sunflower College
More informationSMOCK: A Scalable Method of Cryptographic Key Management For Mission-Critical Networks
SMOCK: A Scalable Method of Cryptographic Key Management For Mission-Critical Networks Wenbo He Ying Huang Klara Nahrstedt Whay C. Lee wenbohe@uiuc.edu huang23@uiuc.edu klara@cs.uiuc.edu Whay.Lee@motorola.com
More informationKey establishment in sensor networks
Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks
More informationSecurity in Ad Hoc Networks Attacks
Security in Ad Hoc Networks Attacks Nie Pin niepin(at)cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks 2007-3-28 NiePin/HUT/CS/TML 1 Agenda Objectives of attacks Target selection
More informationSECURE ROUTING PROTOCOLS IN AD HOC NETWORKS
SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS INTRODUCTION 1. With the advancement in radio technologies like Bluetooth, IEEE 802.11or Hiperlan, a new concept of networking has emerged, known as ad hoc networks,
More informationPerformanceEvaluation of AODV based on black hole attack in ad hoc network
Global Journal of researches in engineering Electrical and electronics engineering Volume 12 Issue 2 Version 1.0 February 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher:
More informationA Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks
A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks Jaydip Sen, M. Girish Chandra, Harihara S.G., Harish Reddy, P. Balamuralidhar Embedded Systems Research Group, Tata Consultancy Services,
More informationLHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks
LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks Sencun Zhu 1 Shouhuai Xu 2 Sanjeev Setia 1 Sushil Jajodia 1,3 1 Center for Secure Information Systems, George Mason University,
More informationDetection of Wormhole Attacks in Wireless Sensor Networks
Detection of Wormhole Attacks in Wireless Sensor Networks Ms Shweta Dalke RGPV: Electronics & Communication,Truba College of Engineering & Technology,Indore,INDIA Ms Pallavi Pahadiya RGPV: Electronics
More informationSecure Routing for Mobile Ad-hoc Networks
Department of Computer Science IIT Kanpur CS625: Advanced Computer Networks Outline 1 2 3 4 Outline 1 2 3 4 Need Often setting up an infrastructure is infeasible Disaster relief Community networks (OLPC)
More informationDefend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Defend Against Cache Consistency Attacks in Wireless Ad Hoc etworks Wensheng Zhang and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park, PA 680
More informationhash chains to provide efficient secure solutions for DSDV [7].
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J. Han {chuah, pey24, jih26}@cse.lehigh.edu Department of Computer Science & Engineering Lehigh University
More informationA Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks
A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks Jaydip Sen 1, Sripad Koilakonda 2, Arijit Ukil 3 Innovation Lab Tata Consultancy Services Ltd. Kolkata-700091, INDIA
More informationMeasure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach
ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.
More informationWormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach
Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach Ning Song and Lijun Qian Department of Electrical Engineering Prairie View A&M University Prairie View, Texas 77446
More informationAn overview of Trust, Naming and Addressing and Establishment of security associations
Security and Cooperation in Wireless Networks Georg-August University Göttingen An overview of Trust, Naming and Addressing and Establishment of security associations trust assumptions; attacker models;
More informationReputation-based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks
1 Reputation-based System for Encouraging the Cooperation of Nodes in Mobile Ad Hoc Networks Tiranuch Anantvalee and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca
More informationWAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks
2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks Sun Choi, Doo-young Kim, Do-hyeon Lee, Jae-il
More informationHADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks
1 : Defense Against Routing Disruptions in Mobile Ad Hoc Networks Wei Yu, Yan Sun and K. J. Ray Liu Department of Electrical and Computer Engineering University of Maryland, College Park Email: weiyu,
More informationRe-examining Probabilistic Versus Deterministic Key Management
Re-examining Probabilistic Versus Deterministic Key Management Dahai Xu Jianwei Huang Jeffrey Dwosin Mung Chiang Ruby Lee {dahaixu, jianweih, jdwosin, chiangm, rblee}@princeton.edu Department of Electrical
More informationWireless Network Security Spring 2011
Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 20, 2011 Class #4 Broadcast information security Agenda Broadcast information security Broadcast authentication and encryption Key management
More informationKey Management in Ad-Hoc Networks
Key Management in Ad-Hoc Networks Jukka Valkonen Helsinki University of Technology Laboratory for Theoretical Computes Science jukka.valkonen@tkk.fi Abstract. Key management is crucial part of security
More informationSecurity Issues In Mobile Ad hoc Network Routing Protocols
Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be
More informationSecure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme
Secure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme A. JEGATHEESAN Assistant Professor, Department of Information Technology Cape Institute of Technology, Levengipuram, Tamilnadu
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Security in ADHOC Sensor Networks Dr. G. Murugaboopathi Head
More informationA Time-Based Key Management Protocol for Wireless Sensor Networks
A Time-Based Key Management Protocol for Wireless Sensor Networks Jiyong Jang 1, Taekyoung Kwon 2, and Jooseok Song 1 1 Department of Computer Science, Yonsei University {souljang, jssong}@emerald.yonsei.ac.kr.
More informationShared Key Based Jamming Mitigation in Wireless Network using Diffie Hellman Elliptic Curve Cryptography
Shared Key Based Jamming Mitigation in Wireless Network using Diffie Hellman Elliptic Curve Cryptography S. Rajeswari 1, Dr V. Anuratha 2 1 Assistant Professor, PG Department of Computer Application, Sree
More informationLHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks
LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks Sencun Zhu 1, Shouhuai Xu 2, Sanjeev Setia 1, and Sushil Jajodia 1 1 Center for Secure Information Systems, George Mason University,
More informationESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS
ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS Ms.T P Rani 1, Dr. C Jaya Kumar 2 1 Research Scholar, Anna University of Technology,Chennai 1 ranitp.2010@gmail.com 2 Department of Computer
More informationSimulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks
Simulation-based Analysis of Security Exposures in Mobile Ad Hoc Networks Pietro Michiardi and Refik Molva Piero.Michiardi@eurecom.fr Refik.Molva@eurecom.fr Institut Eurécom, 2229 Route des Crêtes BP 193
More informationSecure Adhoc Network
International Journal of Computational Engineering Research Vol, 03 Issue, 6 Secure Adhoc Network 1, Pawan Bhadana, 2, Ritu Khurana, 3, Chanchal, 4, Manisha 1, Associate Professor, Department of Computer
More informationDistributed Trust Establishment in MANET s: Swarm Intelligence
Distributed Trust Establishment in MANET s: Swarm Intelligence Laurent Eschenauer, John S. Baras, Virgil Gligor Center for Satellite and Hybrid Communication Networks Department of Electrical and Computer
More informationUse of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks
Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Aleksi Toivonen Helsinki University of Technology Aleksi.Toivonen@tkk.fi Abstract Sensor networks are easily deployable
More informationSecurity in Ad Hoc Networks *
Security in Ad Hoc Networks * Refik Molva and Pietro Michiardi Institut Eurecom 2229 Route des Crêtes 06904 Sophia-Antipolis, France Abstract. In wirelesss ad hoc networks basic network operations are
More informationModels of Authentications in Ad Hoc Networks and Their Related Network Properties
Models of Authentications in Ad Hoc Networks and Their Related Network Properties Katrin Hoeper and Guang Gong {khoeper, ggong}@calliope.uwaterloo.ca Department of Electrical and Computer Engineering University
More informationSecured Routing with Authentication in Mobile Ad Hoc Networks
Journal of Computer Science, 9 (4): 439-448, 2013 ISSN 1549-3636 2013 doi:10.3844/jcssp.2013.439.448 Published Online 9 (4) 2013 (http://www.thescipub.com/jcs.toc) Secured Routing with Authentication in
More informationKey Grids: A Protocol Family for Assigning Symmetric Keys
Key Grids: A Protocol Family for Assigning Symmetric Keys Amitanand S. Aiyer University of Texas at Austin anand@cs.utexas.edu Lorenzo Alvisi University of Texas at Austin lorenzo@cs.utexas.edu Mohamed
More informationSecure Cooperative Mobile Ad Hoc Networks Against Injecting Traffic Attacks
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE SECON 25 proceedings. Secure Cooperative Mobile Ad Hoc Networks
More informationProviding Transparent Security Services to Sensor Networks
1 Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou Athens Information Technology Email: {hsor,msal,tdim}@ait.edu.gr Abstract In this paper
More informationScenario Based Performance Evaluation of Secure Routing in MANETs
Scenario Based Performance Evaluation of Secure Routing in MANETs Karthik Sadasivam Vishal Changrani T. Andrew Yang University of Houston-Clear Lake, Houston, TX, USA ABSTRACT Security in MANETs is critical
More informationWeiyi Zhang AT&T Labs - Research, Middletown, NJ
596 JOURNAL OF COMMUNICATIONS, VOL. 7, NO. 8, AUGUST 212 Mitigating Eavesdropping Attack Using Secure Key Management Scheme in Wireless Mesh Networks Farah Kandah, Yashaswi Singh Department of Computer
More informationA Review Paper on Cooperative Blackhole And Grayhole Attacks in Mobile Ad hoc Networks
A Review Paper on Cooperative Blackhole And Grayhole Attacks in Mobile Ad hoc Networks Sweta Jain #, Jyoti Singhai *, Meenu Chawla # # Department of Computer Science and Engineering MANIT, Bhopal (M.P.)
More informationAn Efficient Key Management Scheme for Heterogeneous Sensor Networks
An Efficient Key Management Scheme for Heterogeneous Sensor Networks S.Gandhi,D.Indira Department of Computer Science and Engineering Gudlavalleru Engineering College Gudlavalleru 521356 Abstract Previous
More informationMOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks
MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks Seung Yi, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign Urbana, IL 61801 {seungyi,rhk}@cs.uiuc.edu
More informationDetection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach
Journal of Network and Computer Applications ] (]]]]) ]]] ]]] www.elsevier.com/locate/jnca Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach Lijun
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationSCENARIO BASED PERFORMANCE EVALUATION OF SECURE ROUTING IN MANETs
SCENARIO BASED PERFORMANCE EVALUATION OF SECURE ROUTING IN MANETs Karthik Sadasivam Vishal Changrani T. Andrew Yang University of Houston-Clear Lake Houston, TX, USA ABSTRACT Security in MANETs is of prime
More informationBy: Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks By: Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, and Aram Khalili W. Du, J. Deng, Y. S. Han, P. K. Varshney,
More informationDesign and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR)
Design and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR) Ayeesha Siddiqha 1, Arshad Khan 2 1 Assistant Professor, Malnad College of Engineering, Hassan, India 2
More informationAn Optimized Inter-Router Authentication Scheme for Ad hoc Networks
An Optimized Inter-Router Authentication Scheme for Ad hoc Networks Lakshmi Venkatraman, Dharma P Agrawal Center For Distributed and Mobile Computing Department of Electrical and Computer Engineering and
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationDynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks
Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Merve Şahin Sabancı University Istanbul, Turkey mervesahin@sabanciuniv.edu Abstract Key distribution is an important issue to provide
More informationPrivacy Protection over Network Communication in Manet
Privacy Protection over Network Communication in Manet 1 Dr.K.Rajangam., Head of EEE Department, SCAD Institute of Technology 2 Ms.L.Dhanam, Assistant Professor Department of Computer Science & Engineering,
More informationSecure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks University of Cambridge Computer Laboratory 22nd IFIP TC-11 International Information Security Conference Sandton,
More informationDETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS
Chapter 14 DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS Yurong Xu, Guanling Chen, James Ford and Fillia Makedon Abstract Wormhole attacks can destabilize or disable wireless sensor networks.
More informationPrevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John ixon and Kendall Nygard epartment of Computer Science, IACC 8 North akota
More informationCluster based certificate revocation For mobile ad hoc networks
www.ijiarec.com ISSN:2348-2079 Volume-5 Issue-2 International Journal of Intellectual Advancements and Research in Engineering Computations Cluster based certificate revocation For mobile ad hoc networks
More informationA Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1029
More information[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor
[Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR
More informationDefenses against Wormhole Attack
Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: 20364216 COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir Outline Introduction Packet Leashes
More informationPrivacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH
Privacy in Vehicular Ad-hoc Networks Nikolaos Alexiou, LCN, EE KTH alexiou@kth.se 2/10/2012 Outline Introduction VANETs: an overview VANET privacy - Anonymity - Location Privacy - VPKI Privacy Attacks
More informationHMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract
HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract Alvaro A. Cardenas, Vahid Ramezani, John S. Baras Department of Electrical and Computer Engineering and Institute for
More informationQoS-based Authentication Scheme for Ad Hoc Wireless Networks
QoS-based Authentication Scheme for Ad Hoc Wireless Networks P Muppala, Johnson Thomas Department of Computer Science Oklahoma State University, USA jpt@cs.okstate.edu Abstract In this paper we investigate
More informationDesign & Evaluation of Path-based Reputation System for MANET Routing
San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research 28 Design & Evaluation of Path-based Reputation System for MANET Routing Ji Li San Jose State University
More informationStrongly Anonymous Communications in Mobile Ad Hoc Networks
Strongly Anonymous Communications in Mobile Ad Hoc Networks Y.Dong 1, V.O.K.Li 1, S.M.Yiu 2 and C.K.Hui 2 Dept. of Electrical and Electronic Engineering, the University of Hong Kong 1 Dept. of Computer
More informationA DISTRIBUTED OCSP FRAMEWORK FOR AD-HOC NETWORKS
IADIS International Conference on Applied Computing 2005 A DISTRIBUTED OCSP FRAMEWORK FOR AD-HOC NETWORKS Giannis F. Marias Dept. of Informatics and Telecommunications University of Athens, Greece, TK15784
More informationEffective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report
Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini
More informationAn Online Threshold Key Distribution Scheme for Symmetric Key Management
An Online Threshold Key Distribution Scheme for Symmetric Key Management Alireza T. Boloorchi, M. H. Samadzadeh, and T. Chen Computer Science Department, Oklahoma State University Stillwater, OK, USA Abstract
More informationA NOVEL ROUTING ATTACK IN MOBILE AD HOC NETWORKS
Abstract Nallamala Sri Hari et. al. / Indian Journal of Computer Science and Engineering A NOVEL ROUTING ATTACK IN MOBILE AD HOC NETWORKS MR. NALLAMALA SRI HARI, M.TECH (CS) Assistant Professor, CSE Dept.,
More informationProviding Security and Energy Management in Location Based Routing of Manet s
Providing Security and Energy Management in Location Based Routing of Manet s Suprita Sambranikar 1, Prathima S D 2 1 Final Year M.Tech Dept. Of ECE, BTL Institute Of Technology And Management, Bangalore,
More informationRobust And Secured WEP Protocol For Wireless Adhoc Network
Robust And Secured WEP Protocol For Wireless Adhoc Network Mr. S.M.K.M. Abbas Ahmad 1, Dr. E.G. Rajan 2, Dr. A.Govardhan 3 1 Associate Professor, Dept. of E.C.E., Hi-Tech College of Engg & Tech, Hyderabad,
More informationRouting and Security in Self Organizing Mobile Ad Hoc Networks (MANET): Challenges and Solutions
Routing and Security in Self Organizing Mobile Ad Hoc Networks (MANET): Challenges and Solutions Ashish Patel Department of Computer Engineering SVM Institute of Technology Bharuch, INDIA adp_svmit@yahoo.co.in
More informationA Secure Architecture for Mobile Ad Hoc Networks
Author manuscript, published in "MSN'2006, Hong Kong : China (2006)" DOI : 10.1007/11943952_36 A Secure Architecture for Mobile Ad Hoc Networks Abderrezak Rachedi 1 and Abderrahim Benslimane 2 1 LIA/CERI,
More informationAn Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks
An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation
More informationDETECTION OF PACKET FORWARDING MISBEHAVIOR IN WIRELESS NETWORK
DETECTION OF PACKET FORWARDING MISBEHAVIOR IN WIRELESS NETWORK 1 N.Karthikeyan 2 Dr.M.Ravindran 1 Research Scholar, Bharathiar University, Coimbatore-641 046. 2 Associate Professor, Department of Computer
More informationarxiv:cs/ v2 [cs.ni] 6 Jul 2003
Observation-based Cooperation Enforcement in Ad hoc Networks Sorav Bansal Mary Baker Stanford University Stanford, CA 9435, USA sbansal@stanford.edu, mgbaker@cs.stanford.edu arxiv:cs/3712v2 [cs.ni] 6 Jul
More informationAn Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks
An Authentication Service Based on Trust and Clustering in Mobile Ad Hoc Networks M.Phil Term 3 paper Department of Computer Science and Engineering The Chinese University of Hong Kong written by Edith
More informationA Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks (MANET) Bhaskar Kumawat, Dev Kumar Computer Science & Information Communication, Suresh Gyan Vihar University, India Abstract In
More informationForward-secure Key Evolution in Wireless Sensor Networks
Forward-secure Key Evolution in Wireless Sensor Networks Marek Klonowski 1 Mirosław Kutyłowski 1 Michał Ren 2 Katarzyna Rybarczyk 2 1 Wrocław University of Technology Wrocław, Poland 2 Adam Mickiewicz
More informationSecure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks
Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department
More informationSECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6
More information