2005
DOI: 10.1109/jsac.2004.842547
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated routing for ad hoc networks

Abstract: Abstract-Initial work in ad hoc routing has considered only the problem of providing efficient mechanisms for finding paths in very dynamic networks, without considering security. Because of this, there are a number of attacks that can be used to manipulate the routing in an ad hoc network. In this paper, we describe these threats, specifically showing their effects on AODV and DSR. Our protocol, named Authenticated Routing for Ad hoc Networks (ARAN), uses public-key cryptographic mechanisms to defeat all iden… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
161
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 252 publications
(162 citation statements)
references
References 31 publications
1
161
0
Order By: Relevance
“…This task is performed by ad hoc routing protocols, which still suffer from a lot of vulnerabilities, mainly due to the unmanaged and non-centralised nature of ad hoc networks. Typical exploits against existing ad hoc routing protocols may be classified into the following categories [16]: AE Modification attacks. A malicious node can cause redirection of data traffic or Denial-of-Service (DoS) attacks by introducing changes in routing control packets or by forwarding routing messages with falsified values.…”
Section: Exploits Against Vehicular Ad Hoc Car-to-car Optimisationsmentioning
confidence: 99%
See 4 more Smart Citations
“…This task is performed by ad hoc routing protocols, which still suffer from a lot of vulnerabilities, mainly due to the unmanaged and non-centralised nature of ad hoc networks. Typical exploits against existing ad hoc routing protocols may be classified into the following categories [16]: AE Modification attacks. A malicious node can cause redirection of data traffic or Denial-of-Service (DoS) attacks by introducing changes in routing control packets or by forwarding routing messages with falsified values.…”
Section: Exploits Against Vehicular Ad Hoc Car-to-car Optimisationsmentioning
confidence: 99%
“…Some ad hoc secure protocols make impossible to perform some of these exploits (such as ARAN [16]). However, there is no mechanism that combines in a secure way a Network Mobility approach, to deal with the issue of vehicular global connectivity, and a Vehicular Ad hoc Network, to optimise local car-to-car communications.…”
Section: Exploits Against Vehicular Ad Hoc Car-to-car Optimisationsmentioning
confidence: 99%
See 3 more Smart Citations