메뉴 건너뛰기




Volumn 29, Issue 2, 2010, Pages 208-224

WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks

Author keywords

AODV (Ad hoc On demand Distance Vector) routing protocol; MANETs (Mobile Ad hoc Networks); Multi path routing; Wormhole attacks

Indexed keywords

AD HOC ON DEMAND DISTANCE VECTOR; AODV (AD HOC ON-DEMAND DISTANCE VECTOR) ROUTING PROTOCOL; MANETS (MOBILE AD HOC NETWORKS); MULTI PATH ROUTING; WORMHOLE ATTACK;

EID: 74149089249     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.09.005     Document Type: Article
Times cited : (78)

References (22)
  • 1
    • 49049107970 scopus 로고    scopus 로고
    • Marianne A. Azer, Sherif M. El-Kassas, Abdel Wahab F, Magdy S. El-Soundani. Intrusion detection for wormhole attacks in ad hoc networks a survey and a proposed decentralized scheme. In the proceedings of the IEEE international conference on availability, reliability and security; 2008. pp. 636-41.
    • Marianne A. Azer, Sherif M. El-Kassas, Abdel Wahab F, Magdy S. El-Soundani. Intrusion detection for wormhole attacks in ad hoc networks a survey and a proposed decentralized scheme. In the proceedings of the IEEE international conference on availability, reliability and security; 2008. pp. 636-41.
  • 4
    • 35148886678 scopus 로고    scopus 로고
    • Mason, Maoyu Wang, Louise Lamont, Ramiro Liscano. Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis
    • In the
    • Gorlatova MA, Peter C. Mason, Maoyu Wang, Louise Lamont, Ramiro Liscano. Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis. In the proceedings of the IEEE conference on military communications; 2006.
    • (2006) proceedings of the IEEE conference on military communications
    • Gorlatova, M.A.1    Peter, C.2
  • 7
    • 17144380644 scopus 로고    scopus 로고
    • The dynamic source routing protocol for mobile ad-hoc network (DSR)
    • work in progress, July
    • Johnson DB, Maltz DA, Hu YC. The dynamic source routing protocol for mobile ad-hoc network (DSR), IETF internet draft (work in progress); July 2004.
    • (2004) IETF internet draft
    • Johnson, D.B.1    Maltz, D.A.2    Hu, Y.C.3
  • 9
    • 50049132985 scopus 로고    scopus 로고
    • MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks
    • In the
    • Issa Khalil, Saurabh Bagchi, and Ness B. Shroff. MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks. In the IEEE securecomm and workshops; 2006. pp. 1-12
    • (2006) IEEE securecomm and workshops , pp. 1-12
    • Khalil, I.1    Bagchi, S.2    Shroff, N.B.3
  • 13
    • 36349035274 scopus 로고    scopus 로고
    • Farid Nai{dotless}t-Abdesselam, Brahim Bensaou, Jinkyu Yoo. Detecting and avoiding wormhole attacks in optimized link state routing protocol. In the proceedings of the IEEE conference on wireless communications and networking; 2007. pp. 3117-22.
    • Farid Nai{dotless}t-Abdesselam, Brahim Bensaou, Jinkyu Yoo. Detecting and avoiding wormhole attacks in optimized link state routing protocol. In the proceedings of the IEEE conference on wireless communications and networking; 2007. pp. 3117-22.
  • 15
    • 47349087906 scopus 로고    scopus 로고
    • Tran Van Phuong, Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee, and Heejo Lee. Transmission time-based mechanism to detect wormhole attacks. In the proceedings of the IEEE Asia-Pacific service computing conference; 2007. pp. 172-8
    • Tran Van Phuong, Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee, and Heejo Lee. Transmission time-based mechanism to detect wormhole attacks. In the proceedings of the IEEE Asia-Pacific service computing conference; 2007. pp. 172-8
  • 16
    • 74149084195 scopus 로고    scopus 로고
    • Kimaya Sanzgiri, Bridget Dahill, Brain Neil Levine, Clay Shields, Elizabeth Belding-Royer. A Secure routing protocol for ad hoc networks. In the proceedings of the 10th IEEE international conference on network protocols (ICNP); November 2002.
    • Kimaya Sanzgiri, Bridget Dahill, Brain Neil Levine, Clay Shields, Elizabeth Belding-Royer. A Secure routing protocol for ad hoc networks. In the proceedings of the 10th IEEE international conference on network protocols (ICNP); November 2002.
  • 20
    • 34247527847 scopus 로고    scopus 로고
    • Xia Wang, Intrusion detection techniques in wireless ad hoc networks. In the proceedings of the IEEE international computer software and applications conference; 2006
    • Xia Wang, Intrusion detection techniques in wireless ad hoc networks. In the proceedings of the IEEE international computer software and applications conference; 2006.
  • 21
    • 37349001578 scopus 로고    scopus 로고
    • Xia Wang and Johnny Wong, An end-to-end detection of wormhole attack in wireless ad-hoc networks. In the proceedings of the 31st annual international computer software and applications conference COMPSAC, 2007
    • Xia Wang and Johnny Wong, An end-to-end detection of wormhole attack in wireless ad-hoc networks. In the proceedings of the 31st annual international computer software and applications conference (COMPSAC); 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.