Proceedings of the 1st ACM Workshop on Wireless Security 2002
DOI: 10.1145/570681.570683
|View full text |Cite
|
Sign up to set email alerts
|

Self-organized network-layer security in mobile ad hoc networks

Abstract: Protecting the network layer in a mobile ad hoc network is an important research topic in wireless security. This paper describes our unified network-layer security solution in ad hoc networks, which protects both routing and packet forwarding functionalities in the context of the AODV protocol. To address the unique characteristics of ad hoc networks, we take a self-organized approach by exploiting full localized design, without assuming any a priori trust or secret association between nodes. In our design, e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
129
0
1

Year Published

2004
2004
2014
2014

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 197 publications
(132 citation statements)
references
References 14 publications
2
129
0
1
Order By: Relevance
“…In cooperative IDS solutions (e.g., hierarchical [12,[30][31][32], groupbased [33][34][35], zone-based [36], or neighbor-assisted [37,38]) every node is assigned a few IDS functions to detect attacks based on local observation. A cooperative IDS engine is then employed for detecting more attacks, based on neighbor information [13,38]. Cooperative mechanisms incur high communication overhead, caused by message exchange required for intrusion detection, and high detection latency [39], since some of decisions are made only after receiving other nodes' reports.…”
Section: State Of the Artmentioning
confidence: 99%
“…In cooperative IDS solutions (e.g., hierarchical [12,[30][31][32], groupbased [33][34][35], zone-based [36], or neighbor-assisted [37,38]) every node is assigned a few IDS functions to detect attacks based on local observation. A cooperative IDS engine is then employed for detecting more attacks, based on neighbor information [13,38]. Cooperative mechanisms incur high communication overhead, caused by message exchange required for intrusion detection, and high detection latency [39], since some of decisions are made only after receiving other nodes' reports.…”
Section: State Of the Artmentioning
confidence: 99%
“…To enforce cooperation several game theory based mechanisms [20][21][22] and other novel mechanisms [23,24] have been proposed in the literature, but these mechanisms also suffer from routing and processing overheads.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Due to the negative impact of misbehaving nodes, researchers have developed different solutions to cope with such a problem. Proposed cooperation enforcement models are based on threshold cryptography [7], micro-payments [6] and reputation [8]. CORE [8] is a cooperative enforcement mechanism based on monitoring and reputation systems.…”
Section: Intrusion Detection Systems In Manetmentioning
confidence: 99%
“…10. 024 and solutions for solving the selfishness problem in routing already exist [6][7][8]. On the other hand, the selfishness problem naturally exists in MANET, although the problem has not been widely studied to our best knowledge.…”
Section: Introductionmentioning
confidence: 99%