Loading...
Search for: secure-routing
0.009 seconds

    SEAODV: Secure efficient AODV routing protocol for MANETs networks

    , Article ACM International Conference Proceeding Series, 24 November 2009 through 26 November 2009, Seoul ; Volume 403 , 2009 , Pages 940-944 ; 9781605587103 (ISBN) Mohammadizadeh, M ; Movaghar, A ; Safi, S. M ; Sharif University of Technology
    Abstract
    Secure routing is one of the most important topics in the wireless MANETs networks. MANETs networks don't have a central infrastructure for the management of routing in the networks. Each node independently routes and sends packets, so many attacks such as forging, modifying, and denial of service (DoS), Occur in these networks. In this paper, we present the new protocol, SEAODV; Secure Efficient Ad-hoc on Demand Routing Protocol for MANETs networks. SEAODV is based on the AODV algorithm and in comparison with existing secure AODV protocols such as SAODV, ARAN and SEAR have improved security and performances. SEAODV uses HEAP authentication Scheme with symmetric cryptography and one-way hash... 

    Improving security issues in MANET AODV routing protocol

    , Article Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 1 September 2015 through 2 September 2015 ; Volume 155 , November , 2015 , Pages 237-250 ; 18678211 (ISSN) ; 9783319250663 (ISBN) Gharehkoolchian, M ; Hemmatyar, A. M. A ; Izadi, M ; Sharif University of Technology
    Springer Verlag  2015
    Abstract
    Mobile Ad-hoc Networks (MANETs) are forming dynamically by joining or leaving the nodes into/from the network without any fix infrastructure. It is also possible that each mobile node act as a host or router. This kind of wireless network is prone to various security threats or attacks due to its unique characteristics like dynamic topology, open medium, lack of central monitoring, etc. So security is a vital scope in MANET to protect communication between mobile nodes. Ad-hoc On-demand Distance Vector (AODV) is one of the on-demand reactive routing protocols in MANET that initially was improved without considering security protection. Significant attempts have been done to secure AODV... 

    Truthful and secure routing in Ad Hoc networks with malicious and selfish nodes

    , Article International Journal of Security and its Applications ; Volume 3, Issue 1 , 2009 , Pages 117-128 ; 17389976 (ISSN) Kargar, M ; Ghodsi, M ; Sharif University of Technology
    Abstract
    Cooperation among nodes is important in ad hoc networks since in such networks nodes depend on each other for forwarding packets. However, cooperation in such operations consumes nodes energy and recourses. Therefore, it is necessary to design incentive mechanisms to enforce nodes to forward packets when the source and destination of the packet are other nodes in the network. We study routing in ad hoc and wireless networks from a game theoretic view point. Based on this view, the network consists of selfish and greedy nodes who accept payments for forwarding data for other nodes if the payments cover their individual costs incurred by forwarding data. Also, route falsification attacks are... 

    Secure overlay routing for large scale networks

    , Article IEEE Transactions on Network Science and Engineering ; 2018 ; 23274697 (ISSN) Gharib, M ; Yousefizadeh, H ; Movaghar, A ; Sharif University of Technology
    IEEE Computer Society  2018
    Abstract
    Probabilistic key pre-distribution schemes have recently emerged as major tools of addressing secure routing challenge in wireless networks. In our previous work, we propose an algorithm capable of finding optimal secure paths in overlay wireless networks. An important concern related to that algorithm is the scalability of the solution for large scale networks containing thousands of nodes. In this paper, we propose two alternative solutions for the previously formulated problem of secure overlay routing that can effectively scale to thousands of nodes. The first one is a deterministic Dijkstra-based algorithm analytically proven to find the optimal path with a time complexity much lower... 

    Improving Security Issues in MANET AODV Routing Protocol

    , M.Sc. Thesis Sharif University of Technology Gharehkoolchian, Mahsa (Author) ; Izadi, Mohammad (Supervisor)
    Abstract
    Nowadays, use of wireless networks and devices is inevitable due to their beneficial features, such as ease of use, portability, rapid and comfortable access to information. On the other hand, the security for wireless networks is a challenging matter by overwhelming increase over the number of mobile hardware and devices. Mobile Ad-hoc network (MANET) is a class of wireless networks, which forms dynamically by joining or leaving the nodes into/from the network without any fix infrastructure. This kind of network in comparison to other types of networks, is prone to various security threats or attacks due to its unique characteristics (dynamic topology, open medium, lack of central... 

    An identity-based network access control scheme for single authority MANETs

    , Article Proceedings - 2010 IEEE Asia-Pacific Services Computing Conference, APSCC 2010, 6 December 2010 through 10 December 2010 ; December , 2010 , Pages 462-468 ; 9780769543055 (ISBN) Aghakazem Jourabbaf, N ; Movaghar, A ; Institute of Electrical and Electronics Engineers; IEEE Computer Society; IEEE Comput. Soc. Tech. Comm. Serv. Comput. (TCSC); Natural Science Foundation of China; Hangzhou Dianzi University ; Sharif University of Technology
    2010
    Abstract
    Security in mobile ad hoc networks (MANETs) is an active research topic. Bulks of prior work focused on key management and secure routing without addressing an important pre-requisite: network access control, the problem of how securely extend the network. In this paper, we present INAC, an identity-based network access control scheme for MANETs. In INAC, each node in the network must have an identity-based membership token in order to take part in network activities. Membership tokens have special formats, which not only guarantee security of non-compromised nodes, but also enable that nodes obtain identity-based membership tokens based on their trustworthiness. Through simulations we... 

    Truthful and secure routing in Ad Hoc networks

    , Article 2008 International Symposium on Computer Science and its Applications, CSA 2008, Hobart, TAS, 13 October 2008 through 15 October 2008 ; October , 2008 , Pages 369-376 ; 9780769534282 (ISBN) Kargar, M ; Ghodsi, M
    2008
    Abstract
    Cooperation among nodes is vital in wireless networks since in such networks nodes depend on each other for routing packets. However, cooperation in such operations consumes nodes recourses such as battery and bandwidth. Therefore, it is necessary to design incentive mechanisms to enforce nodes to forward packets when the source and destination of the packet are other nodes. We study routing in wireless networks from a game theoretic view point. Based on this view, the network consists of greedy and selfish nodes who accept payments for forwarding data for other nodes if the payments cover their individual costs incurred by forwarding data. Also, route falsification attacks are easy to... 

    ID-NAC: Identity-based network access control for MANETs

    , Article 2008 16th International Conference on Networks, ICON 2008, New Delhi, 12 December 2008 through 14 December 2008 ; February , 2008 ; 9781424438051 (ISBN) Aghakazem Jourabbaf, N ; Movaghar, A ; Sharif University of Technology
    2008
    Abstract
    Security in mobile ad hoc networks (MANETs) is an active research topic. Bulks of prior work focused on key management and secure routing without addressing an important pre-requisite: network access control, the problem of admission and revocation of ad hoc nodes. In this paper, we present ID-NAC, identity-based network access control for MANETs. In ID-NAC each node in the network maintains a profile table, which contains information about the behavior of the nodes in the MANET. It is used to assign a quantitative value for the trustworthiness of a node. Since, there is no observation about the behaviors of prospective members at first; they are admitted to the network tentatively. Then,... 

    Trusted secure routing for ad hoc networks

    , Article MobiWac'07 - Proceedings of the 5th ACM International Workshop on Mobility Management and Wireless Access, Chania, Crete Island, 22 October 2007 through 22 October 2007 ; 2007 , Pages 176-179 ; 9781595938091 (ISBN) Haghpanah, N ; Akhoondi, M ; Kargar, M ; Movaghar, A ; Sharif University of Technology
    2007
    Abstract
    Cooperation among nodes is vital in Mobil Ac Hoc Networks (MANETs) since in such networks nodes depend on each other for forwarding and routing packets. However, cooperation in such operations consumes nodes' recourses such as battery and bandwidth. Therefore it is necessary to design incentive mechanisms to enforce nodes to forward packets when the source and destination of the packet are other nodes. In this paper, we present a distributed fair solution to judge, punish and re-admit a selfish node, forcing nodes to cooperate with each other. Our scheme is different from previous ones in that it combines two characteristics that have been separately handled in previous works. The first... 

    A novel approach for avoiding wormhole attacks in VANET

    , Article 1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009, 3 November 2009 through 5 November 2009, Kathmundu ; 2009 ; 9781424445707 (ISBN) Safi, S. M ; Movaghar, A ; Mohammadizadeh, M ; Sharif University of Technology
    Abstract
    Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network. This action provides a short connection in the network that is controlled by these malicious nodes. Hence they control all Packets that come to them and threaten the security of data within packets or delete them. Totally, what a wormhole does is an incorrect understanding of network... 

    A bayesian game approach for preventing DoS attacks in wireless sensor networks

    , Article Proceedings - 2009 WRI International Conference on Communications and Mobile Computing, CMC 2009, 6 January 2009 through 8 January 2009, Kunming, Yunnan ; Volume 3 , 2009 , Pages 507-511 ; 9780769535012 (ISBN) Mohi, M ; Movaghar, A ; Zadeh, P. M ; Sharif University of Technology
    2009
    Abstract
    Wireless sensor networks (WSNs) are a new technology, foreseen to be used increasingly in the near future, and security is an important issue for them. However because of the nodes resource limitations, other schemes proposed for securing general ad hoc networks, are not appropriate for WSNs. Usually some nodes act maliciously and they are able to do different kinds of DoS attacks. In order to make the network more secure, malicious nodes should be isolated from the network. In this paper, we model the interaction of nodes in WSN and intrusion detection system (IDS) as a Bayesian game formulation and use this idea to make a secure routing protocol. By this approach nodes are motivated to act...