Secure Routing and Intrusion Detection in Ad Hoc Networks

dc.contributor.authorPatwardhan, A.
dc.contributor.authorParker, J.
dc.contributor.authorIorga, M.
dc.contributor.authorKarygiannis, T.
dc.date.accessioned2018-12-10T15:50:45Z
dc.date.available2018-12-10T15:50:45Z
dc.date.issued2005-03-21
dc.description.abstractNumerous schemes have been proposed for secure routing and Intrusion Detection for ad hoc networks. Yet, little work exists in actually implementing such schemes on small handheld devices. In this paper, we present a proof-of-concept implementation of a secure routing protocol based on AODV over IPv6, further reinforced by a routing protocol independent Intrusion Detection System (IDS) for ad hoc networks. Security features in the routing protocol include mechanisms for non-repudiation and authentication, without relying on the availability of a Certificate Authority (CA) or a Key Distribution Center (KDC). We present the design and implementation details of our system, the practical considerations involved, and how these mechanisms can be used to detect and thwart malicious attacks. We discuss several scenarios where the secure routing and intrusion detection mechanisms isolate and deny network resources to nodes deemed malicious.We also discuss shortcomings in our approach, and conclude with lessons learned and ideas for future work.en_US
dc.description.sponsorshipThis research was supported by NSF award 9875433, and a grant from NISTen_US
dc.description.urihttps://ieeexplore.ieee.org/document/1392755en_US
dc.format.extent9 pagesen_US
dc.genreconference papers and proceedings preprintsen_US
dc.identifierdoi:10.13016/M2QN5ZG2F
dc.identifier.citationA. Patwardhan , J. Parker , A. Joshi, M. Iorga, T. Karygiannis , Secure Routing and Intrusion Detection in Ad Hoc Networks, Third IEEE International Conference on Pervasive Computing and Communications , 2005, DOI: 10.1109/PERCOM.2005.38en_US
dc.identifier.uri10.1109/PERCOM.2005.38
dc.identifier.urihttp://hdl.handle.net/11603/12195
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rightsPublic Domain Mark 1.0*
dc.rightsThis work was written as part of one of the author's official duties as an Employee of the United States Government and is therefore a work of the United States Government. In accordance with 17 U.S.C. 105, no copyright protection is available for such works under U.S. Law.
dc.rights.urihttp://creativecommons.org/publicdomain/mark/1.0/*
dc.subjectSecure Routingen_US
dc.subjectintrusion detectionen_US
dc.subjectad hoc networksen_US
dc.subjectUMBC Ebiquity Research Groupen_US
dc.titleSecure Routing and Intrusion Detection in Ad Hoc Networksen_US
dc.typeTexten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
01392755.pdf
Size:
351.68 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: