2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.
DOI: 10.1109/saintw.2003.1210190
|View full text |Cite
|
Sign up to set email alerts
|

Secure link state routing for mobile ad hoc networks

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
413
0
2

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 504 publications
(415 citation statements)
references
References 19 publications
0
413
0
2
Order By: Relevance
“…Several methods have been proposed for the distributed implementation of a CA [11,28,33]. Alternatively, methods based on symmetric keys can be used to protect critical messages [15,24,27].…”
Section: Network and Adversarial Modelsmentioning
confidence: 99%
“…Several methods have been proposed for the distributed implementation of a CA [11,28,33]. Alternatively, methods based on symmetric keys can be used to protect critical messages [15,24,27].…”
Section: Network and Adversarial Modelsmentioning
confidence: 99%
“…Recent research studies have also brought up a new type of attack that goes under the name of wormhole attack [10,18,19,23,26]. In the latter, two compromised nodes create a tunnel (or wormhole) that is linked through a private connection and thus they manage to by-pass the network.…”
Section: Security Challenges In Mobile Ad-hoc Networkmentioning
confidence: 99%
“…Compromised nodes can easily perform integrity attacks by altering protocol fields in order to subvert traffic, denying communication to legitimate nodes and compromising the integrity of routing computations in general. Spoofing is a special case of integrity attacks whereby a compromised node impersonates a legitimate one due to the lack of authentication in the current ad hoc routing protocols [10,18,20].…”
Section: Security Challenges In Mobile Ad-hoc Networkmentioning
confidence: 99%
“…An important usage of this approach is to secure routing. Usually, the security of routing in mobile ad hoc networks requires a rather heavy initialization phase, which can even include the pre-loading in nodes of secret keys shared with other nodes [16,15,23]. This is well suited for "closed" networks, but not for the case we consider here; in particular, it would prohibit the entry of new nodes once the network is already in operation.…”
Section: Introductionmentioning
confidence: 99%