Mohit Virendra

Learn More
— This paper introduces a Trust-Domain based security architecture for mobile ad-hoc networks (MANETs). The aim of this architecture is twofold: to use trust as a basis to establish keys between nodes in a MANET, and to utilize trust as a metric for establishing secure distributed control in infrastructure-less MANETs. We define metrics for nodes to(More)
This paper proposes a trust-based framework for improving the security and robustness of ad-hoc network routing protocols. We choose the popular and widely used Ad-hoc On-demand Distance Vector (AODV) Routing protocol as a representative candidate for constructing our trust framework. The goal is to make minimal changes to the functioning of AODV and obtain(More)
Wireless networks are prone to certain information security threats that are either unique, or more pronounced for them due to the open air nature of the channel, bandwidth limitations and constantly changing topology. The concept of trust management, i.e., establishment of trust combined with trust monitoring, can be useful for mitigating the consequences(More)
This paper 1 describes survivability schemes against Access Point (AP) failures in Wireless LANs. It particularly aims for resiliency and survivability against multistage attacks where the adversary is successful in compromising the AP, and then targets the survived but more vulnerable network. This is true in real life where the adversary knows that(More)
This paper demonstrates the provable superiority of multi-path routing protocols over other conventional protocols against blocking, node-isolation and network-partitioning type-attacks in Wireless Mesh Networks (WMNs) by emulating adver-sarial behavior. Though the underlying network model is of a WMN with mobile nodes, the results in this paper are equally(More)
This chapter focuses on an important, challenging and yet largely unaddressed problem in Wireless Sensor Networks (WSN) data communication: detecting cheating aggregators and malicious/selfish discarding of data reports en route to the Base Stations (BSs). If undetected, such attacks can significantly affect the performance of applications. The goal is to(More)
Current multipath protocols for Multi-Hop Wireless Networks (MWNs) use hop-count as the default route selection criteria. Route selection should also consider network and link conditions. We propose a network-environment-aware trust-based route selection framework for MWNs that makes informed and adaptive route-selection decisions. A node quantifies trust(More)
—We present a class of Minimum Cost Blocking (MCB) problems in Wireless Mesh Networks (WMNs) with multi-path wireless routing protocols. We establish the provable superiority of multi-path routing protocols over conventional protocols against blocking, node-isolation and network-partitioning type attacks. In our attack model, an adversary is considered(More)
In this paper we analyzed the algorithms related to threshold cryptography based protocols in networks security. We showed the hardness of threshold minimum cut problem, revealed its relationship with two other problems. Two approximation algorithms for threshold minimum cut were presented. We also show the hardness of determining the probability of(More)