Mobile Ad-Hoc Networks Security

In this paper we are focusing on closed MANETs where only authorized nodes are supposed to access the network. We denote “outsider” nodes as those nodes that are not authorized to access the network, and ‘insider” nodes as those that are. The objective of this research is to develop mechanisms that protect a closed MANET against malicious behavior from outsider nodes as well as insider nodes through packet authentication and a Trust Management System, respectively.

[1]  Turgay Korkmaz,et al.  EMLTrust: An enhanced Machine Learning based Reputation System for MANETs , 2012, Ad Hoc Networks.

[2]  Eugene H. Spafford,et al.  An Application of Pattern Matching in Intrusion Detection , 1994 .

[3]  Niki Pissinou,et al.  On quality of service routing in ad-hoc networks , 2003, 28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings..

[4]  G.V.S. Raju,et al.  Defending against malicious nodes using an SVM based Reputation System , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[5]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[6]  Turgay Korkmaz,et al.  HEAP: A packet authentication scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.

[7]  Shouhuai Xu,et al.  LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[8]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[9]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[10]  Udo W. Pooch,et al.  A lightweight authentication protocol for mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[11]  Ramesh Patil,et al.  Routing in Ad Hoc Networks , 2006 .

[12]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[13]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[14]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .

[15]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[16]  Eugene H. Spafford,et al.  Active Defense of a Computer System using Autonomous Agents , 1995 .

[17]  Ninghui Li,et al.  Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[18]  Yvo Desmedt,et al.  Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.

[19]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[20]  M. Asaka,et al.  A method of tracing intruders by use of mobile agents , 1999 .

[21]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[22]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).