Proceedings of the 38th Annual Hawaii International Conference on System Sciences
DOI: 10.1109/hicss.2005.531
|View full text |Cite
|
Sign up to set email alerts
|

Secure Dynamic Source Routing

Abstract: Abstract-In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also present a number of similar protocols and compare the different approaches. After a detailed description of SDSR, we show that the stated security goals are met using the BAN logic formalism.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(17 citation statements)
references
References 24 publications
0
17
0
Order By: Relevance
“…Whereas a lot of effort was already put in securing traditional MANETs [14,15], the security research for position-based routing and VANETs is still in its infancy. Reference [16] gives a first overview on this subject.…”
Section: Related Workmentioning
confidence: 99%
“…Whereas a lot of effort was already put in securing traditional MANETs [14,15], the security research for position-based routing and VANETs is still in its infancy. Reference [16] gives a first overview on this subject.…”
Section: Related Workmentioning
confidence: 99%
“…In order to overcome this problem some protocols (e.g., SDSR [214] and endairA [12]) avoid signing the route request. In some other protocols (e.g., in SRP [294] and in Ariadne [180] and, instead of digital signatures, they can authenticate the information that they add to control packets by using more efficient MACs that are verifiable by the target of the control packets (assuming that the target shares a key with every intermediate node that processed the packet).…”
Section: Protection Of Mutable Information In Control Packetsmentioning
confidence: 99%
“…In security area we can find a wide variety of secure protocols [4]; most of them are based in one of the classic MANET routing protocols. Thus we find ADSR [5], ARIADNE [6], SDSR [7] and SRDP [8] based on DSR [9]; ARAN [10], SAODV [11] and SEAR [12] based on AODV [13]; SEAD [14] based on DSDV [15]; or SOLSR [16] based on OLSR [17].…”
Section: Introductionmentioning
confidence: 99%