2007
DOI: 10.1016/j.adhoc.2006.05.020
|View full text |Cite
|
Sign up to set email alerts
|

SecMR – a secure multipath routing protocol for ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
60
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 77 publications
(60 citation statements)
references
References 15 publications
0
60
0
Order By: Relevance
“…In [17] a complete secure Multipath routing protocol (SecMR) was developed. SecMR works in two phases.…”
Section: Related Workmentioning
confidence: 99%
“…In [17] a complete secure Multipath routing protocol (SecMR) was developed. SecMR works in two phases.…”
Section: Related Workmentioning
confidence: 99%
“…In the Gray Hole Attack an adversary silently drops some or all of the data packets sent to it instead of forwarding them. Mavropodi [12] proposed an on-demand multipath routing protocol which they named secure multipath routing protocol (SecMR), and analyzed its security properties. Komninos et al [13] described the layered security approach, design criteria and performance analysis of some MANET security protocols.…”
Section: Literature Reviewmentioning
confidence: 99%
“…So, the final message that will be sent from S to "next hop" will be: Each intermediate node I will perform the same steps that were done by S, with the exception that I will be using M 1 as the message to work on instead of M p . First, I separates the encrypted block from the encrypted list of nodes, saves the encrypted block as M 11 and the encrypted list as M 12 . Then it calculates the next hop, generates signature of M 11 using its own private key, generates block of {M 11 ||MAC(M 11 )|| timestamp} and encrypts it using destination's public key, and adds itself to M 12 and encrypts the result with the destination's public key.…”
Section: Proposed Mechanismmentioning
confidence: 99%
“…In fact one of the main security issues in SRP is that it has no defence against the invisible node attack (INA) (Marshall et al, 2003) that simply puts itself (and possibly a large number of other invisible nodes) somewhere along the message path without adding itself to the path, thereby causing potentially big problems as far as routing goes. Mavropodi et al proposed an on-demand multipath routing protocol called Secure Multipath Routing (SecMR) (Mavropodi et al, 2007) protocol that can find multiple node disjoint routes with protection against denial-of-service (DoS) attacks from a bounded number of collaborating insider attackers. However, the authors have mentioned that SecMR protocol does not fully protect from Man-In-Middle (MIM) and invisible node attacks.…”
Section: Security Mechanism In Multipath Wireless Ad Hoc Networkmentioning
confidence: 99%
“…These protocols could be used to guarantee the acquisition of correct network topological information. For securing multipath routing in the wireless ad hoc network, several protocols such as Secure Routing Protocol (SRP) (Papadimitratos & Haas, 2002), Secure Multipath Routing Protocol (SecMR) (Mavropodi et al, 2007) and Secure, Disjoint, Multipath Source Routing Protocol (SDMSR) (Berton et al, 2006) can be used. Secure Routing Protocol (SRP) (Papadimitratos & Haas, 2002) assumes the shared symmetric key between the source and destination and data protection using Message Authentication Codes (MACs) in order to validate the authenticity and integrity.…”
Section: Security Mechanism In Multipath Wireless Ad Hoc Networkmentioning
confidence: 99%