Learn More
— This paper introduces a Trust-Domain based security architecture for mobile ad-hoc networks (MANETs). The aim of this architecture is twofold: to use trust as a basis to establish keys between nodes in a MANET, and to utilize trust as a metric for establishing secure distributed control in infrastructure-less MANETs. We define metrics for nodes to(More)
Existing wireless LAN (WLAN) security schemes are few and product specific. While there exist some schemes for information integrity related problems, there are few standard solutions for quality of service and network health maintenance related problems in wireless networks. In this paper we propose an architecture model for secure WLAN that is generic in(More)
This paper proposes a trust-based framework for improving the security and robustness of ad-hoc network routing protocols. We choose the popular and widely used Ad-hoc On-demand Distance Vector (AODV) Routing protocol as a representative candidate for constructing our trust framework. The goal is to make minimal changes to the functioning of AODV and obtain(More)
Wireless networks are prone to certain information security threats that are either unique, or more pronounced for them due to the open air nature of the channel, bandwidth limitations and constantly changing topology. The concept of trust management, i.e., establishment of trust combined with trust monitoring, can be useful for mitigating the consequences(More)
This paper describes survivability schemes against access point (AP) failures in wireless LANs. It particularly aims for resiliency and survivability against multistage attacks where the adversary is successful in compromising the AP, and then targets the survived but more vulnerable network. This is true in real life where the adversary knows that(More)
Existing WLAN security schemes are few and product specific. While there exist some schemes for dealing with problems relating to information integrity, there are hardly any standard solutions for security problems relating to quality of service and network health maintenance in wireless networks. In the absence of strong standards, the existing approach to(More)
This paper demonstrates the provable superiority of multi-path routing protocols over other conventional protocols against blocking, node-isolation and network-partitioning type-attacks in Wireless Mesh Networks (WMNs) by emulating adver-sarial behavior. Though the underlying network model is of a WMN with mobile nodes, the results in this paper are equally(More)
This chapter focuses on an important, challenging and yet largely unaddressed problem in Wireless Sensor Networks (WSN) data communication: detecting cheating aggregators and malicious/selfish discarding of data reports en route to the Base Stations (BSs). If undetected, such attacks can significantly affect the performance of applications. The goal is to(More)
Current multipath protocols for Multi-Hop Wireless Networks (MWNs) use hop-count as the default route selection criteria. Route selection should also consider network and link conditions. We propose a network-environment-aware trust-based route selection framework for MWNs that makes informed and adaptive route-selection decisions. A node quantifies trust(More)
—We present a class of Minimum Cost Blocking (MCB) problems in Wireless Mesh Networks (WMNs) with multi-path wireless routing protocols. We establish the provable superiority of multi-path routing protocols over conventional protocols against blocking, node-isolation and network-partitioning type attacks. In our attack model, an adversary is considered(More)