We also analyze the security framework that was used for route discovery and argue that composability is an essential feature for ubiquitous applications. Article :. Date of Publication: 19 January DOI: Communication is achieved by relaying data along appropriate routes, that are dynamically discovered and maintained through collaboration between the nodes. Discovery of such routes is a major task, both from an efficiency and from a security point of view. Among the novel characteristics of this security model is that it promises security guarantees under concurrent executions, a feature of crucial practical implication for this type of distributed computation.
A novel route discovery algorithm called endairA was also proposed, together with a claimed security proof within the same model. Ant colony optimization based enhanced dynamic source routing algorithm for mobile ad-hoc network. Information Sciences , , 67— Deng, H. Routing security in wireless ad hoc networks. Hayajneh, T.
Secure neighborhood creation in wireless ad hoc networks using hop count discrepancies. Mobile Networks and Applications , 17 3 , — An energy-efficient and security aware route selection protocol for wireless sensor networks. Security and Communication Networks , 7 11 , — Nakayama, H. A dynamic anomaly detection scheme for aodv-based mobile ad hoc networks. Buneman, P. Why and where: A characterization of data provenance. Zhou, W.
Efficient querying and maintenance of network provenance at internet-scale. Chen, A. The good, the bad, and the differences: Better network diagnostics with differential provenance. Secure network provenance. In Proceedings of the twenty-third ACM symposium on operating systems principles pp. Nettrails: A declarative platform for maintaining and querying provenance in distributed systems. Wu, Y. Answering why-not queries in software-defined networks with negative provenance.
In Proceedings of the twelfth ACM workshop on hot topics in networks p. Diagnosing missing events in distributed systems with negative provenance. Li, T. Confidential reasoning and verification towards secure routing in ad hoc networks. In International conference on algorithms and architectures for parallel processing pp. Haeberlen, A. Practical accountability for distributed systems. Gurney, A.
Having your cake and eating it too: Routing security with privacy protections. In Proceedings of the 10th ACM workshop on hot topics in networks p.
Netreview: Detecting when interdomain routing goes wrong. NSDI , , — Google Scholar. Secure authentication for remote patient monitoring with wireless medical sensor networks.
Sensors , 16 4 , Papadimitriou, A.
0コメント