2017
DOI: 10.1109/tmc.2017.2649527
|View full text |Cite
|
Sign up to set email alerts
|

SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks

Abstract: Abstract-The flexibility and mobility of Mobile Ad hoc Networks (MANETs) have made them increasingly popular in a wide range of use cases. To protect these networks, security protocols have been developed to protect routing and application data. However, these protocols only protect routes or communication, not both. Both secure routing and communication security protocols must be implemented to provide full protection. The use of communication security protocols originally developed for wireline and WiFi netw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 61 publications
(35 citation statements)
references
References 23 publications
0
33
0
Order By: Relevance
“…ere are several attacks possible on MANETs as enumerated in [3,20] with their corresponding techniques of defending beside them. e issue of performance was specifically touched upon in this work for both MANETs with Internet access-the greatest source of most networkbased attacks in today's world and for standalone MANETs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…ere are several attacks possible on MANETs as enumerated in [3,20] with their corresponding techniques of defending beside them. e issue of performance was specifically touched upon in this work for both MANETs with Internet access-the greatest source of most networkbased attacks in today's world and for standalone MANETs.…”
Section: Related Workmentioning
confidence: 99%
“…ese broad categorizations imply that MANETs have comprehensive operational capabilities. However, it is their diversity that makes such networks very susceptible to the aforementioned attacks [3][4][5].…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, from both simulations and investigational results, it was identified that, for sparse and largely associated networks, the delay occurred by security connections was very least when distinguished with the entire packet delay. In 2017, Smith et al [11] have introduced a new secure framework known as SUPERMAN.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Various MANET authentication schemes are reviewed in this work as shown in Fig 1, which comprises [7], Timestamp method [8], GASMAN [9], Poissonization scheme [10], SUPERMAN [11], PCA [37], RIPsec [38], peer-to-peer model [44], HEAP [48] schemes. In addition, models like JATC scheme [12], Dempster-Shafer [14], SDRAC [16], IBBE scheme [5] [46], Trilateration Model [18], DSR [20], DTD method [21], Hashing Algorithm [28], Netpro [30], GS scheme [32], QASEC [33], BSG [35], DTQCAR [36], CLPKM [39], Tidal trust algorithm [47], E-voting protocol [54], NACK [58], LIPG [59], IDDIP [60] and Game theoretic Model [65] are also adopted in different contributions.…”
Section: Algorithmic Analysismentioning
confidence: 99%
“…This process tends to prolong the end-to-end delay for data transmission between source and destination nodes [32]. Hybrid routing protocols such as zone routing protocol (ZRP) [33] and Secure Link State routing (SLSP) [34] handle routing activity by dividing the network into zones while combining the best features of reactive and proactive routing protocols to make a timely and informed routing decision. For instance, in the event that a node wants to transmit packets to a destination node within a certain geographical zone of its immediate neighboring network, it will choose the proactive approach to handle this task.…”
Section: Introductionmentioning
confidence: 99%