메뉴 건너뛰기




Volumn 9, Issue 8, 2009, Pages 1141-1157

Mitigation of colluding route falsification attacks by insider nodes in mobile ad hoc networks

Author keywords

Mobile ad hoc networks; Packet filters; Routing protocol; Wormhole attacks

Indexed keywords

ARIADNE; CONTROL PACKETS; DATA TRAFFIC; FALSE ALARM RATE; FLOWTHROUGH; GLOMOSIM; IN-BAND; MALICIOUS INSIDERS; MALICIOUS NODES; NETWORK THROUGHPUT; ON-DEMAND; PACKET FILTERING; PACKET FILTERS; PACKET TRANSMISSIONS; ROUTING PATH; SECURE ROUTING PROTOCOLS; SIMULATION ANALYSIS; SIMULATION RESULT; SPECIAL HARDWARE; SYNCHRONIZED CLOCKS; WORMHOLE ATTACKS;

EID: 68349086979     PISSN: 15308669     EISSN: None     Source Type: Journal    
DOI: 10.1002/wcm.692     Document Type: Article
Times cited : (2)

References (34)
  • 1
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • Hu Y-C, Perrig A, Johnson DB. Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In Proceedings of IEEE INFOCOM, 2003.
    • (2003) Proceedings of IEEE INFOCOM
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 3
    • 4544221255 scopus 로고    scopus 로고
    • Secure ad hoc on-demand distance vector (SAODV) routing
    • Zapata MG. Secure ad hoc on-demand distance vector (SAODV) routing. In IETF Internet Draft. http://www.ietf.org/internetdrafts/draft-guerrero-manet- saodv-00.txt, 2001.
    • (2001) IETF Internet Draft
    • Zapata, M.G.1
  • 5
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Hu Y-C, Perrig A, Johnson DB. Ariadne: a secure on-demand routing protocol for ad hoc networks. Wireless Networks 2005; 11(1-2): 21-38.
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 6
    • 85008543309 scopus 로고    scopus 로고
    • Provably secure on-demand source routing in mobile ad hoc networks
    • Ács G, Buttyán L, Vajda I. Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing 2006; 5(11): 1533-1546.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.11 , pp. 1533-1546
    • Ács, G.1    Buttyán, L.2    Vajda, I.3
  • 9
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the confidant protocol: Cooperation of nodes fairness in dynamic adhoc networks
    • Buchegger S, Le Boudec J-Y. Performance analysis of the confidant protocol: cooperation of nodes fairness in dynamic adhoc networks. In Proceedings of IEEE/ACM MobiHOC, 2002.
    • (2002) Proceedings of IEEE/ACM MobiHOC
    • Buchegger, S.1    Le Boudec, J.-Y.2
  • 10
    • 25844465866 scopus 로고    scopus 로고
    • HADOF: Defense against routing disruption in mobile ad hoc networks
    • Yu W, Sun Y, Liu KJR. HADOF: defense against routing disruption in mobile ad hoc networks. In Proceedings of IEEE INFOCOM, 2005.
    • (2005) Proceedings of IEEE INFOCOM
    • Yu, W.1    Sun, Y.2    Liu, K.J.R.3
  • 11
    • 84937555407 scopus 로고    scopus 로고
    • Traffic analysis: Protocols, attacks, design issues, and open problems
    • Raymond J-F.Traffic analysis: protocols, attacks, design issues, and open problems. In Anonymity 2000, LNCS 2009, 2001; 10- 29.
    • (2001) Anonymity 2000, LNCS 2009 , pp. 10-29
    • Raymond, J.-F.1
  • 12
    • 0003417978 scopus 로고    scopus 로고
    • Glomosim: A scalable network simulation environment, v2.03
    • UC Los Angeles, CA, December
    • Bagrodia R, et al. Glomosim: A scalable network simulation environment, v2.03. Parallel Computing Lab, UC Los Angeles, CA, December 2000.
    • (2000) Parallel Computing Lab
    • Bagrodia, R.1
  • 13
    • 3042595360 scopus 로고    scopus 로고
    • Ad Hoc On Demand Distance Vector (AODV) Routing
    • July, RFC 3561
    • Perkins CE, Belding-Royer EM, Das SR. Ad Hoc On Demand Distance Vector (AODV) Routing. IETF, July 2003. RFC 3561.
    • (2003) IETF
    • Perkins, C.E.1    Belding-Royer, E.M.2    Das, S.R.3
  • 15
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and tradeoffs in anonymity providing systems
    • Back A, Moller U, Stiglic A. Traffic analysis attacks and tradeoffs in anonymity providing systems. In 1H 2001, LNCS 2137, 2001; 245-257.
    • (2001) 1H 2001, LNCS 2137 , pp. 245-257
    • Back, A.1    Moller, U.2    Stiglic, A.3
  • 16
    • 25644450392 scopus 로고    scopus 로고
    • Perfect simulation and stationarity of a class of mobility models
    • Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
    • Le Boudec J-Y, Vojnovic M. Perfect simulation and stationarity of a class of mobility models. In Proceedings of IEEE INFOCOM, 2005; 2743-2754. (Pubitemid 41382387)
    • (2005) Proceedings - IEEE INFOCOM , vol.4 , pp. 2743-2754
    • Le Boudec, J.-Y.1    Vojnovic, M.2
  • 21
    • 0003428414 scopus 로고
    • Stevens WR (ed.), Addison-Wesley: Reading, Massachusetts
    • Stevens WR (ed.). TCP/IP Illustrated: The Protocols, Vol. 1. Addison-Wesley: Reading, Massachusetts, 1994.
    • (1994) TCP/IP Illustrated: The Protocols , vol.1
  • 24
    • 68349085165 scopus 로고    scopus 로고
    • Defense advanced research projects agency. Frequently asked questions v4 for BAA 01-01
    • Washington DC
    • Defense Advanced Research Projects Agency. Frequently asked questions v4 for BAA 01-01, FCS Communication Technology. Washington DC, 2000.
    • (2000) FCS Communication Technology
  • 25
    • 4544259841 scopus 로고    scopus 로고
    • Sector: Secure tracking of node encounters in multiple-hop wireless networks
    • Capkun S, Buttyán L, Hubaux J-P. Sector: secure tracking of node encounters in multiple-hop wireless networks. In Proceedings of SASN, 2003; 21-32.
    • (2003) Proceedings of SASN , pp. 21-32
    • Capkun, S.1    Buttyán, L.2    Hubaux, J.-P.3
  • 28
    • 33845916834 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • Poovendran R, Lazos L. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. ACM Journal of Wireless Networks (WINET) 2007; 13(1): 27-59.
    • (2007) ACM Journal of Wireless Networks (WINET) , vol.13 , Issue.1 , pp. 27-59
    • Poovendran, R.1    Lazos, L.2
  • 29
    • 37549006809 scopus 로고    scopus 로고
    • MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks
    • Khalil I, Bagchi S, Shroff NB. MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks. Elsevier Ad Hoc Networks 2008; 6(3): 344-362.
    • (2008) Elsevier Ad Hoc Networks , vol.6 , Issue.3 , pp. 344-362
    • Khalil, I.1    Bagchi, S.2    Shroff, N.B.3
  • 31
    • 39349084494 scopus 로고    scopus 로고
    • Logical wormhole prevention in optimized link state routing protocol
    • DOI 10.1109/GLOCOM.2007.195, 4411105, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
    • Attir A, Nait-Abdesselam F, Bensaou B, Ben-Othman J. Logical wormhole prevention in optimized link state routing protocol. In Proceedings of Global Telecommunications Conference (GLOBECOM'07), 2007; 1011-1016. (Pubitemid 351259183)
    • (2007) GLOBECOM - IEEE Global Telecommunications Conference , pp. 1011-1016
    • Attir, A.1    Nait-Abdesselam, F.2    Bensaou, B.3    Ben-Othman, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.