2009 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing 2009
DOI: 10.1109/pacrim.2009.5291240
|View full text |Cite
|
Sign up to set email alerts
|

VESS: a Versatile Extensible Security Suite for MANET routing

Abstract: This paper presents a powerful and versatile security suite for the AODV (Ad-hoc On-demand Distance Vector) routing protocol. It offers a coverage on common security aspects such as encryption and authentication, and it can be easily modified to work with any distance-vector-based routing for MANET (Mobile Ad hoc Networks). The suite utilizes powerful authentication and user-adjustable encryptions based on digital certificate chaining and popular ciphers such as DES, AES, and RSA. The security strength can be … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Chang et al [6] presents a powerful and versatile security suite for the AODV (Ad-hoc Ondemand Distance Vector) routing protocol. It offers coverage on common security aspects such as encryption and authentication, and it can be easily modified to work with any distance-vector-based routing for MANET (Mobile Ad hoc Networks).…”
Section: Related Workmentioning
confidence: 99%
“…Chang et al [6] presents a powerful and versatile security suite for the AODV (Ad-hoc Ondemand Distance Vector) routing protocol. It offers coverage on common security aspects such as encryption and authentication, and it can be easily modified to work with any distance-vector-based routing for MANET (Mobile Ad hoc Networks).…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, there must be some results synchronization methods avoiding well known problems like Byzantine failures [3]. Furthermore, depending on the requested and the available confidentiality level, encryption has to be granted [4], and potentially also nonces and key escrow have to be secured in case of an identity-based security approach like the one in [5]. In the previously discussed centralized approach, the design and the granting of all these assumptions are up to the central entity maintaining the service, whereas in this case, this has to be enforced in a collaborative fashion between participating nodes.…”
Section: Table III Centralized Approachmentioning
confidence: 99%
“…This is achieved through a subdivision and transformation of a secret message into multiple shares following secret sharing schemes, which are then delivered via independent paths to the destination. The exploitation of different levels of security on the same MANET is achieved in [5]. Authors present a security suite covering both security and authentication schemes.…”
Section: Related Workmentioning
confidence: 99%