• Publications
  • Influence
A performance comparison of multi-hop wireless ad hoc network routing protocols
TLDR
This paper presentsthe results of a derailedpacket-levelsimulationcomparing fourmulti-hopwirelessad hoc networkroutingprotocolsthatcover a range of designchoices: DSDV,TORA, DSR and AODV. Expand
Packet leashes: a defense against wormhole attacks in wireless networks
TLDR
We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. Expand
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
TLDR
We present attacks against routing in ad hoc networks, and we present the design and performance evaluation of a new secure on-demand ad hoc network routing protocol, called Ariadne. Expand
Ariadne: a secure on-demand routing protocol for ad hoc networks
a secure on-demand routing protocol for ad hoc networks.
The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4
TLDR
The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. Expand
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
TLDR
We design and evaluate the Secure Efficient Ad hoc Distance vector routing protocol based on the design of the Destination-Sequenced Distance-Vector routing protocol (DSDV). Expand
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
TLDR
We design and evaluate the Secure Efficient Ad hoc Distance vector routing protocol (SEAD), a secure ad hoc network routing protocol based on the design of the Destination-Sequenced Distance-Vector routing protocol. Expand
Rushing attacks and defense in wireless ad hoc network routing protocols
TLDR
We present the rushing attack, a new attack that results in denial-of-service when used against all previous on-demand ad~hoc network routing protocols. Expand
Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularlyExpand
Wormhole attacks in wireless networks
TLDR
We present a general mechanism, called packet leashes, for detecting and, thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. Expand
...
1
2
3
4
5
...