SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks

  title={SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks},
  author={Darren Hurley-Smith and Jodie Wetherall and Andrew A. Adekunle},
  journal={IEEE Transactions on Mobile Computing},
The flexibility and mobility of Mobile Ad hoc Networks (MANETs) have made them increasingly popular in a wide range of use cases. To protect these networks, security protocols have been developed to protect routing and application data. However, these protocols only protect routes or communication, not both. Both secure routing and communication security protocols must be implemented to provide full protection. The use of communication security protocols originally developed for wireline and… CONTINUE READING


Publications citing this paper.
Showing 1-5 of 5 extracted citations

Behavior-aware UAV-assisted crowd sensing technique for urban vehicular environments

2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC) • 2018
View 1 Excerpt

An Authenticated Security Framework Protecting Routes and Data in MANET

2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) • 2017
View 1 Excerpt

On the secure optimized link state routing (SOLSR) protocol for MANETs

2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE) • 2017
View 1 Excerpt


Publications referenced by this paper.
Showing 1-10 of 33 references

Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) • 2015
View 3 Excerpts

A Cluster-Based Approach to Consensus Based Distributed Task Allocation

2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing • 2014
View 2 Excerpts

DoS Attacks in Mobile Ad Hoc Networks: A Survey

2012 Second International Conference on Advanced Computing & Communication Technologies • 2012
View 1 Excerpt

An evaluation of protocols for uav science applications

W. Ivancic, D. Stewart, D. Sullivan, P. Finch
2011. • 2011
View 1 Excerpt

Performance analysis of mesh routing protocols for UAV swarming applications

2011 8th International Symposium on Wireless Communication Systems • 2011
View 1 Excerpt

Different types of attacks on integrated manet-internet communication

A. K. Rai, R. R. Tewari, S. K. Upadhyay
International Journal of Computer Science and Security, vol. 4, no. 3, pp. 265–274, 2010. • 2010
View 1 Excerpt

Similar Papers

Loading similar papers…