A survey of secure wireless ad hoc routing
- 21 June 2004
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Security & Privacy
- Vol. 2 (3), 28-39
- https://doi.org/10.1109/msp.2004.1
Abstract
Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Attacks on ad hoc network routing protocols disrupt network performance and reliability. The article reviews attacks on ad hoc networks and discusses current approaches for establishing cryptographic keys in ad hoc networks. We describe the state of research in secure ad hoc routing protocols and its research challenges.Keywords
This publication has 22 references indexed in Scilit:
- A secure routing protocol for ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- SEAD: secure efficient distance vector routing for mobile wireless ad hoc networksAd Hoc Networks, 2003
- Secure message transmission in mobile ad hoc networksAd Hoc Networks, 2003
- Secure link state routing for mobile ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Efficient authentication and signing of multicast streams over lossy channelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Securing ad hoc routing protocolsPublished by Association for Computing Machinery (ACM) ,2002
- Zero-interaction authenticationPublished by Association for Computing Machinery (ACM) ,2002
- Neighbor Discovery for IP Version 6 (IPv6)1998
- TCP Selective Acknowledgment Options1996
- Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computersPublished by Association for Computing Machinery (ACM) ,1994