Share This Author
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks
This paper proposes a simple mechanism based on a counter in each node to stimulate the nodes for packet forwarding and studies the behavior of the proposed mechanism analytically and by means of simulations, and detail the way in which it could be protected against misuse.
Enforcing service availability in mobile ad-hoc WANs
This work presents a secure mechanism to stimulate end users to keep their devices turned on, to refrain from overloading the network, and to thwart tampering aimed at converting the device into a "selfish" one.
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
This work proposes a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services.
The quest for security in mobile ad hoc networks
An overview of security problems for mobile ad hoc networks is provided, distinguishing the threats on basic mechanisms and on security mechanisms and the solution to protect the security mechanisms is described.
Secure vehicular communication systems: design and architecture
- Panos Papadimitratos, L. Buttyán, J. Hubaux
- Computer ScienceIEEE Communications Magazine
- 1 November 2008
This work addresses the problem of security and protection of private user information within the SeVeCom project, having developed a security architecture that provides a comprehensive and practical solution that can be quickly adopted and deployed.
Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks
In order to stimulate cooperation, a virtual currency is introduced and the way it can be protected against theft and forgery is detailed.
SECTOR: secure tracking of node encounters in multi-hop wireless networks
SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks, is presented and it is shown that, due to their efficiency and simplicity, they are compliant with the limited resources of most mobile devices.
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
This paper proposes a mathematical framework in which security can be precisely defined and routing protocols for mobile ad hoc networks can be proved to be secure in a rigorous manner and proposes a new on-demand source routing protocol, called endairA, which is demonstrated by proving that it is secure in the model.
Self-organization in mobile ad hoc networks: the approach of Terminodes
- L. Blazevic, L. Buttyán, Srdjan Capkun, S. Giordano, J. Hubaux, J. Boudec
- Computer ScienceIEEE Commun. Mag.
- 1 June 2001
A global description of the building blocks used by the basic operation of the Terminodes network; they all rely on various concepts of self-organization.
VeRA - Version Number and Rank Authentication in RPL
- A. Dvir, T. Holczer, L. Buttyán
- Computer ScienceIEEE Eighth International Conference on Mobile Ad…
- 17 October 2011
A new security service is described that prevents any misbehaving node from illegitimately increasing the Version Number and compromise illegitimate decreased Rank values in RPL.