MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat.
DOI: 10.1109/milcom.2000.904011
|View full text |Cite
|
Sign up to set email alerts
|

Techniques for intrusion-resistant ad hoc routing algorithms (TIARA)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
1

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(10 citation statements)
references
References 2 publications
0
9
0
1
Order By: Relevance
“…Techniques for Intrusion Resistant Ad hoc Routing Algorithms (TIARA) [30] identified and presented a collection of design rules that can be applied to overcome the impact of malicious nodes and ensure acceptable level of operation of network under DoS attack. A proposal called BISS in [31] improvised existing routing schemes wit incomplete Security Associations (SAs) by using MACs and digital signatures.…”
Section: Miscellaneous Historic Solutionsmentioning
confidence: 99%
“…Techniques for Intrusion Resistant Ad hoc Routing Algorithms (TIARA) [30] identified and presented a collection of design rules that can be applied to overcome the impact of malicious nodes and ensure acceptable level of operation of network under DoS attack. A proposal called BISS in [31] improvised existing routing schemes wit incomplete Security Associations (SAs) by using MACs and digital signatures.…”
Section: Miscellaneous Historic Solutionsmentioning
confidence: 99%
“…Another reactive scheme, called Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA) was proposed by Ramanujam et al to detect and eliminate DoS [28]. This model presents a new approach for building intrusion resistant ad hoc networks in the wake of DoS attacks using wireless router extensions.…”
Section: Review Of Manet Attack Prevention Securitymentioning
confidence: 99%
“…These secure protocols are mostly based on authentication and encryption algorithms, being inefficient to put all intruders and attacks off. In this way, some research groups have built intrusion tolerant routing approaches as TIARA (Techniques for Intrusion-resistant Ad Hoc Routing Algorithms) [43], Best-Effort Fault Tolerant Routing (BFTR) [44], ODSBR (An On-Demand Secure Byzantine Routing Protocol) [45] and Boudriga's approach [13].…”
Section: Route Discoverymentioning
confidence: 99%