International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. 2004
DOI: 10.1109/itcc.2004.1286675
|View full text |Cite
|
Sign up to set email alerts
|

Secure multipath communication in mobile ad hoc networks

Abstract: Mobile ad hoc networks (MANETs) are collections of autonomous mobile nodes with links that are made or broken in an arbitrary way. They have no fixed infrastructure and may have constrained resources. The next generation of IT applications is expected to rely heavily on such networks. However, before they can be successfully deployed several security threats must be addressed. These are mainly due to the ad hoc nature of these networks. Consequently it may be much harder (or even impossible) to establish routi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2005
2005
2010
2010

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 37 publications
(31 citation statements)
references
References 19 publications
0
31
0
Order By: Relevance
“…The work in [4] presents distributed Bound-Control and Lex-Control algorithms, which compute multiple paths, respectively, in such a way that the performance degradation (e.g., throughput loss) is minimized when a single-link attack or a multi-link attack happens, respectively. Other examples of secure deterministic multi-path routing algorithms include SRP [9], SecMR [8], Burmester's approach [3], and AODV-MAP [11].…”
Section: B Simulation Resultsmentioning
confidence: 99%
“…The work in [4] presents distributed Bound-Control and Lex-Control algorithms, which compute multiple paths, respectively, in such a way that the performance degradation (e.g., throughput loss) is minimized when a single-link attack or a multi-link attack happens, respectively. Other examples of secure deterministic multi-path routing algorithms include SRP [9], SecMR [8], Burmester's approach [3], and AODV-MAP [11].…”
Section: B Simulation Resultsmentioning
confidence: 99%
“…Instead of relying on a cryptographic method for resolving the issue, our work mainly exploits the routing functionality of the network to reduce the chance that a packet can be acquired by the adversary in the first place. Other secure multi-path routing algorithms include SRP [16], SecMR [14], Burmester's approach [3], and AODV-MAP [21]. Among them, SRP uses end-toend symmetric cryptography to protect the integrity of the route discovery; SecMR protects against the denialof-service attack from a bounded number of collaborating malicious nodes; Burmester's method is based on the digital signatures of the intermediate nodes; AODV-MAP is another modification of AODV, which can provide local bypass of the attacked nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Of particular interest, from a security point of view, are subgraphs G ST with multiple connectivity between S, T . For example, multipaths [32]. Such routes may have sufficient redundancy to guarantee communication, i.e., may contain at least one secure path (with no adversarial nodes).…”
Section: Multipaths and Subgraphsmentioning
confidence: 99%
“…However there are ways to partly mitigate this. For example, the source can select communication paths in G ST on a rotation basis (adaptive multipath routing [32]). Another approach is to use random subgraphs G ST of G that link S, T .…”
Section: Multipaths and Subgraphsmentioning
confidence: 99%