Raffo, 2005 - Google Patents
Security schemes for the OLSR protocol for ad hoc networksRaffo, 2005
View PDF- Document ID
- 11266504409368363643
- Author
- Raffo D
- Publication year
External Links
Snippet
Within the domain of wireless computer networks, this thesis examines the security issues related to protection of packet routing in ad hoc networks (MANETs). This thesis classifies the different possible attacks and examines in detail the case of OLSR (Optimized Link State …
- 230000001010 compromised 0 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/48—Routing tree calculation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yih-Chun et al. | A survey of secure wireless ad hoc routing | |
Gupte et al. | Secure routing in mobile wireless ad hoc networks | |
Raffo | Security schemes for the OLSR protocol for ad hoc networks | |
Yang et al. | Security in mobile ad hoc networks: challenges and solutions | |
Zhou et al. | Securing wireless sensor networks: a survey | |
Michiardi et al. | Ad hoc networks security | |
Wang et al. | A survey of secure routing in ad hoc networks | |
Tamilselvan et al. | Prevention of impersonation attack in wireless mobile ad hoc networks | |
Islam et al. | SHWMP: a secure hybrid wireless mesh protocol for IEEE 802.11 s wireless mesh networks | |
Park et al. | ISMANET: a secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks | |
Dahshan et al. | A robust self‐organized public key management for mobile ad hoc networks | |
Fourati et al. | A shared secret-based algorithm for securing the OLSR routing protocol | |
Vinayakan et al. | Security Mandated Analytics based Route Processing with Digital Signature [SMARPDS]-Pseudonymous Mobile Ad Hoc Routing Protocol | |
Islam et al. | A secure hybrid wireless mesh protocol for 802.11 s mesh network | |
Kumar | Asymmetric key cryptography based ad-hoc on demand distance vector protocol (ac-aodv) | |
Panday et al. | A Review on security Issues of AODV routing protocol for MANETs | |
Serhrouchni et al. | Security Schemes for the OLSR Protocol for Ad Hoc Networks | |
Djenouri et al. | Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks | |
Kumar et al. | Secure routing protocols in ad hoc networks: A review | |
Komninos et al. | Multifold node authentication in mobile ad hoc networks | |
Abuhaiba et al. | Securing zone routing protocol in Ad-hoc networks | |
Su et al. | Crosscheck mechanism to identify malicious nodes in ad hoc networks | |
Pani | A secure zone-based routing protocol for mobile ad hoc networks | |
Dhir et al. | Security-aware optimized link routing protocol for mobile ad-hoc networks | |
Komninos et al. | A two‐step authentication framework for mobile ad hoc networks |