메뉴 건너뛰기




Volumn 30, Issue 1, 2007, Pages 308-330

Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach

Author keywords

Multi path routing; Wireless ad hoc network; Wormhole attack

Indexed keywords

MULTIPATH PROPAGATION; ROUTERS; SECURITY SYSTEMS; STATISTICAL METHODS; SYNCHRONIZATION;

EID: 33750599100     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2005.07.003     Document Type: Article
Times cited : (49)

References (28)
  • 1
    • 0027693935 scopus 로고
    • Diversity coding for transparent self-healing and fault-tolerant communication networks
    • Ayanoglu E., I C., Gitlin R., and Mazo J. Diversity coding for transparent self-healing and fault-tolerant communication networks. IEEE Trans Commun 41 (1993) 1677-1686
    • (1993) IEEE Trans Commun , vol.41 , pp. 1677-1686
    • Ayanoglu, E.1    I, C.2    Gitlin, R.3    Mazo, J.4
  • 2
    • 4544259841 scopus 로고    scopus 로고
    • Capkun S, Buttyan L, Hubaux J. SECTOR: secure tracking of node encounters in multi-hop wireless networks. ACM workshop on security of ad hoc and sensor networks (SASN), Washington, DC, USA; October 2003. p. 1-12.
  • 3
    • 3543123509 scopus 로고    scopus 로고
    • STREAM: sensor topology retrieval at multiple resolutions
    • Deb B., Bhatnagar S., and Nath B. STREAM: sensor topology retrieval at multiple resolutions. Telecommun Syst 26 (2004) 285-320
    • (2004) Telecommun Syst , vol.26 , pp. 285-320
    • Deb, B.1    Bhatnagar, S.2    Nath, B.3
  • 4
    • 0035017228 scopus 로고    scopus 로고
    • Grossglauser M, Tse D. Mobility increases the capacity of ad-hoc wireless networks. Proceedings of IEEE INFOCOM; April 2001. p. 1360-9.
  • 5
    • 33750581662 scopus 로고    scopus 로고
    • Hu L, Evans D. Using directional antennas to prevent wormhole attacks. Network and distributed system security symposium (NDSS), San Diego; February 2004.
  • 6
    • 85177501976 scopus 로고    scopus 로고
    • Hu Y, Johnson D. Caching strategies in on-demand routing protocols for wireless ad hoc networks. Proceedings of MobiCom; August 2000. p. 231-42.
  • 7
    • 84961572484 scopus 로고    scopus 로고
    • Hu Y, Johnson DB, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Proceedings of the 4th IEEE workshop on mobile computing systems & applications (WMCSA 2002), IEEE, Calicoon, NY; June 2002a. p. 3-13.
  • 8
    • 85177210833 scopus 로고    scopus 로고
    • Hu Y, Perrig A, Johnson DB. Ariadne: a secure on-demand routing protocol for ad hoc networks. MobiCom 2002, Atlanta, GA; September 2002b. p. 12-23.
  • 9
    • 0041973497 scopus 로고    scopus 로고
    • Hu Y-C, Perrig A, Johnson DB. Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. Proceedings of INFOCOM 2003; April 2003a. p. 1976-86.
  • 10
    • 1542317831 scopus 로고    scopus 로고
    • Hu Y-C, Perrig A, Johnson DB. Rushing attacks and defense in wireless ad hoc network routing protocols. ACM workshop on wireless security (WiSe 2003), Westin Horton Plaza Hotel, San Diego, CA; September 2003b. p. 30-40.
  • 11
    • 33750578378 scopus 로고    scopus 로고
    • Johnson D, Maltz D, Hu Y. The dynamic source routing protocol for mobile ad hoc networks. Internet draft, draft-ietf-manet-dsr-09.txt, April 2003.
  • 12
    • 0034844688 scopus 로고    scopus 로고
    • Lee S, Gerla M. Split multipath routing with maximally disjoint paths in ad hoc networks. Proceedings of IEEE ICC, vol. 10; May 2001. p. 3201-5.
  • 13
    • 33750576068 scopus 로고    scopus 로고
    • Marina MK, Das SR. Ad hoc on-demand multipath distance vector routing protocol. Proceedings of IEEE ICNP; November 2001.
  • 14
    • 1842665110 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Mishra A., Nadkarni K., and Patcha A. Intrusion detection in wireless ad hoc networks. IEEE Wireless Commun 11 1 (2004) 48-60
    • (2004) IEEE Wireless Commun , vol.11 , Issue.1 , pp. 48-60
    • Mishra, A.1    Nadkarni, K.2    Patcha, A.3
  • 15
    • 84944881532 scopus 로고    scopus 로고
    • Nasipuri A, Das SR. On-demand multipath routing for mobile ad hoc networks. Proceedings of the 8th international conference on computer communications and networks (IC3N), Boston, MA; 1999.
  • 16
    • 33750602325 scopus 로고    scopus 로고
    • Papadimitratos P, Haas ZJ. Secure routing for mobile ad hoc networks. SCS communication networks and distributed systems modeling and simulation conference (CNDS 2002), San Antonio, TX; January 2002.
  • 17
    • 84944714533 scopus 로고    scopus 로고
    • Patcha A, Mishra A. Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. Proceedings of RAWCON '03; 2003. p. 75-8.
  • 18
    • 33750596144 scopus 로고    scopus 로고
    • Perkins C, Belding-Royer E, Das S. Ad hoc on-demand distance vector (AODV) routing. RFC 3561; July 2003.
  • 19
    • 0042976106 scopus 로고    scopus 로고
    • Pham P, Perreau S. Performance analysis of reactive shortest path and multi-path routing mechanism with load balance. Proceedings of INFOCOM 2003; 2003. p. 251-9.
  • 20
    • 84904904836 scopus 로고    scopus 로고
    • Sanzgiri K, Dahill B, Levine B, Shields C, Belding-Royer E. A secure routing protocol for ad hoc networks. Proceedings of the 10th IEEE international conference on network protocols (ICNP'02), Paris, France; November 2002. p. 78-87.
  • 21
    • 2342588224 scopus 로고    scopus 로고
    • Analysis of multipath routing-part I: the effect on the packet delivery ratio
    • Tsirigos A., and Haas Z.J. Analysis of multipath routing-part I: the effect on the packet delivery ratio. IEEE Trans Wireless Commun 3 1 (2004) 138-146
    • (2004) IEEE Trans Wireless Commun , vol.3 , Issue.1 , pp. 138-146
    • Tsirigos, A.1    Haas, Z.J.2
  • 22
    • 2342625273 scopus 로고    scopus 로고
    • Analysis of multipath routing-part II: mitigation of the effects of frequently changing network topologies
    • Tsirigos A., and Haas Z.J. Analysis of multipath routing-part II: mitigation of the effects of frequently changing network topologies. IEEE Trans Wireless Commun 3 2 (2004) 500-511
    • (2004) IEEE Trans Wireless Commun , vol.3 , Issue.2 , pp. 500-511
    • Tsirigos, A.1    Haas, Z.J.2
  • 23
    • 33750592595 scopus 로고    scopus 로고
    • Vasudevan R, Sanyal S. A novel multipath approach to security in mobile ad hoc networks (MANETs). Proceedings of the international conference on computers and devices for communication (CODEC'04), Kolkata, India; January 2004.
  • 24
    • 11244309139 scopus 로고    scopus 로고
    • Wang W, Bhargava B. Visualization of wormholes in sensor networks. ACM Workshop on Wireless Security (WiSe 2004), Philadelphia, PA; October 2004. p. 51-60.
  • 25
    • 33750586162 scopus 로고    scopus 로고
    • Wang W, Bhargava B, Lu Y, Wu X. Defending against wormhole attacks in mobile ad hoc networks. Preprint, http://www.cs.purdue.edu/homes/wangwc/papers/MC2R_sample_101104.pdf
  • 26
    • 33750576544 scopus 로고    scopus 로고
    • Zapata M. Secure ad hoc on-demand distance vector routing. ACM mobile computing and communications review (MC2R), vol. 6(3); July 2002, p. 106-7.
  • 27
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Zhang Y., Lee W., and Huang Y. Intrusion detection techniques for mobile wireless networks. Wireless Networks 9 5 (2003) 545-556
    • (2003) Wireless Networks , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.3
  • 28
    • 0142187757 scopus 로고    scopus 로고
    • Zhen J, Srinivas S. Preventing replay attacks for secure routing in ad hoc networks. ADHOC-NOW 2003, Lecture Notes in Computer Science, vol. 2865; 2003. p. 140-50.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.