Mohit Virendra

Learn More
This paper introduces a Trust-Domain based security architecture for mobile ad-hoc networks (MANETs). The aim of this architecture is twofold: to use trust as a basis to establish keys between nodes in a MANET, and to utilize trust as a metric for establishing secure distributed control in infrastructure-less MANETs. We define metrics for nodes to establish(More)
This paper proposes a trust-based framework for improving the security and robustness of ad-hoc network routing protocols. We choose the popular and widely used Ad-hoc On-demand Distance Vector (AODV) Routing protocol as a representative candidate for constructing our trust framework. The goal is to make minimal changes to the functioning of AODV and obtain(More)
This paper describes survivability schemes against access point (AP) failures in wireless LANs. It particularly aims for resiliency and survivability against multistage attacks where the adversary is successful in compromising the AP, and then targets the survived but more vulnerable network. This is true in real life where the adversary knows that(More)
Existing wireless LAN (WLAN) security schemes are few and product specific. While there exist some schemes for information integrity related problems, there are few standard solutions for quality of service and network health maintenance related problems in wireless networks. In this paper we propose an architecture model for secure WLAN that is generic in(More)
This paper demonstrates the provable superiority of multi-path routing protocols over other conventional protocols against blocking, node-isolation and network-partitioning typeattacks in Wireless Mesh Networks (WMNs) by emulating adversarial behavior. Though the underlying network model is of a WMN with mobile nodes, the results in this paper are equally(More)
Existing WLAN security schemes are few and product specific. While there exist some schemes for dealing with problems relating to information integrity, there are hardly any standard solutions for security problems relating to quality of service and network health maintenance in wireless networks. In the absence of strong standards, the existing approach to(More)
We present a class of Minimum Cost Blocking (MCB) problems in Wireless Mesh Networks (WMNs) with multi-path wireless routing protocols. We establish the provable superiority of multi-path routing protocols over conventional protocols against blocking, node-isolation and network-partitioning type attacks. In our attack model, an adversary is considered(More)
This chapter focuses on an important, challenging and yet largely unaddressed problem in Wireless Sensor Networks (WSN) data communication: detecting cheating aggregators and malicious/selfish discarding of data reports en route to the Base Stations (BSs). If undetected, such attacks can significantly affect the performance of applications. The goal is to(More)
Pairwise key generation between two parties is a fundamental problem in cryptography and computer security. In wireless networks, since it is dangerous to store any long-lived secret in wireless devices, pairwise master key (PMK) generation between two parties is based either on passwords (with low entropy) or on some other information. Due to the limited(More)