메뉴 건너뛰기




Volumn 4, Issue 8, 2011, Pages 793-806

TOGBAD-an approach to detect routing attacks in tactical environments

Author keywords

Intrusion detection; Routing attacks; Tactical environments

Indexed keywords

GRAPHIC METHODS; TOPOLOGY;

EID: 79960416739     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.185     Document Type: Article
Times cited : (10)

References (38)
  • 1
    • 62349116211 scopus 로고    scopus 로고
    • Enhancements on and Evaluation of TOGBAD in Tactical MANETS. Proceedings of the 27th Military Communication Conference (MILCOM)
    • Gerhards-Padilla E, Aschenbruck N, Martini P. Enhancements on and Evaluation of TOGBAD in Tactical MANETS. Proceedings of the 27th Military Communication Conference (MILCOM), 2008.
    • (2008)
    • Gerhards-Padilla, E.1    Aschenbruck, N.2    Martini, P.3
  • 2
    • 47249164736 scopus 로고    scopus 로고
    • Detecting blackhole attacks in Tactical MANETs using topology graphs. Proceedings of the 3rd IEEE LCN Workshop on Network Security (WNS)
    • Gerhards-Padilla E, Aschenbruck N, Martini P, Jahnke M, Tölle J. Detecting blackhole attacks in Tactical MANETs using topology graphs. Proceedings of the 3rd IEEE LCN Workshop on Network Security (WNS), 2007.
    • (2007)
    • Gerhards-Padilla, E.1    Aschenbruck, N.2    Martini, P.3    Jahnke, M.4    Tölle, J.5
  • 3
    • 0035789229 scopus 로고    scopus 로고
    • The Quest for Security in Mobile Ad Hoc Networks. Proceedings of the 2nd ACM International Symposium on Mobile ad hoc Networking & Computing (MobiHOC)
    • Hubaux J, Buttyán L, Capkun S. The Quest for Security in Mobile Ad Hoc Networks. Proceedings of the 2nd ACM International Symposium on Mobile ad hoc Networking & Computing (MobiHOC), 2001.
    • (2001)
    • Hubaux, J.1    Buttyán, L.2    Capkun, S.3
  • 4
    • 85177236447 scopus 로고    scopus 로고
    • Ariadne: a secure on-demand routing protocol for ad hoc networks. Proceedings of the 8th ACM International Conference on Mobile Computing and Networking
    • Hu Y, Perrig A, Johnson D. Ariadne: a secure on-demand routing protocol for ad hoc networks. Proceedings of the 8th ACM International Conference on Mobile Computing and Networking, 2002.
    • (2002)
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 5
    • 84947612457 scopus 로고    scopus 로고
    • Bedrohungen gegen taktische mobile Adhoc-Netzwerke (MANETs). FGAN/FKIE, Wachtberg, Germany, Tech. Rep., December 2005, appointed by the Federal Office for information management and information technology of the German Federal Armed Forces [in German].
    • Jahnke M, Tölle J. Bedrohungen gegen taktische mobile Adhoc-Netzwerke (MANETs). FGAN/FKIE, Wachtberg, Germany, Tech. Rep., December 2005, appointed by the Federal Office for information management and information technology of the German Federal Armed Forces [in German].
    • Jahnke, M.1    Tölle, J.2
  • 6
    • 79960393443 scopus 로고    scopus 로고
    • IETF Draft Simplified Multicast Forwarding for MANET, Available at:
    • Macker J. IETF Draft Simplified Multicast Forwarding for MANET, 2009. Available at:.
    • (2009)
    • Macker, J.1
  • 7
    • 79960423319 scopus 로고    scopus 로고
    • RFC 3626 Optimized Link State Routing Protocol (OLSR), Available at:
    • Clausen T, Jacquet P. RFC 3626 Optimized Link State Routing Protocol (OLSR), 2003. Available at:.
    • (2003)
    • Clausen, T.1    Jacquet, P.2
  • 8
    • 79960434598 scopus 로고    scopus 로고
    • IETF Draft MANET Neighborhood Discovery Protocol, Available at:
    • Clausen T, Dearlove C, Dean J. IETF Draft MANET Neighborhood Discovery Protocol, 2009. Available at:.
    • (2009)
    • Clausen, T.1    Dearlove, C.2    Dean, J.3
  • 9
    • 79960431684 scopus 로고    scopus 로고
    • IETF Draft The Optimized Link State Routing Protocol version 2, Available at:
    • Clausen T, Dearlove C, Jacquet P. IETF Draft The Optimized Link State Routing Protocol version 2, 2009. Available at:.
    • (2009)
    • Clausen, T.1    Dearlove, C.2    Jacquet, P.3
  • 10
    • 33744502133 scopus 로고    scopus 로고
    • Secure OLSR. Proceedings of the 19th International Conference on Advanced Information Networking and Applications
    • Hong F, Hong L, Fu C. Secure OLSR. Proceedings of the 19th International Conference on Advanced Information Networking and Applications, 2005.
    • (2005)
    • Hong, F.1    Hong, L.2    Fu, C.3
  • 11
    • 14844323027 scopus 로고    scopus 로고
    • An advanced signature system for OLSR. Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
    • Raffo D, Adjih C, Clausen T, Mühlethaler P. An advanced signature system for OLSR. Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, 2004.
    • (2004)
    • Raffo, D.1    Adjih, C.2    Clausen, T.3    Mühlethaler, P.4
  • 12
    • 33845927390 scopus 로고    scopus 로고
    • Smart handling of colluding black hole Attacks in MANETs and wireless sensor networks using multipath routing. Proceedings of 7th IEEE Workshop on Information Assurance
    • Ramaswami S, Upadhyaya S. Smart handling of colluding black hole Attacks in MANETs and wireless sensor networks using multipath routing. Proceedings of 7th IEEE Workshop on Information Assurance, 2006.
    • (2006)
    • Ramaswami, S.1    Upadhyaya, S.2
  • 13
    • 79960387351 scopus 로고    scopus 로고
    • RFC 3561 Ad hoc On-Demand Distance Vector (AODV) Routing, Available at:
    • Perkins C, Belding-Royer E, Das S. RFC 3561 Ad hoc On-Demand Distance Vector (AODV) Routing, 2003. Available at:.
    • (2003)
    • Perkins, C.1    Belding-Royer, E.2    Das, S.3
  • 14
    • 79960425472 scopus 로고    scopus 로고
    • IETF Draft Secure Ad hoc On-Demand Distance Vector (SAODV) Routing, Available at:
    • Zapata M. IETF Draft Secure Ad hoc On-Demand Distance Vector (SAODV) Routing, 2006. Available at:.
    • (2006)
    • Zapata, M.1
  • 15
    • 84961572484 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications(WMCSA)
    • Hu Y, Johnson D, Perrig A. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications(WMCSA), 2002.
    • (2002)
    • Hu, Y.1    Johnson, D.2    Perrig, A.3
  • 16
    • 79960408290 scopus 로고    scopus 로고
    • A performance comparison of multi-hop wireless ad hoc network routing protocols. Proceedings of the 4th ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom)
    • Broch J, Maltz D, Johnson D, Hu Y, Jetcheva J. A performance comparison of multi-hop wireless ad hoc network routing protocols. Proceedings of the 4th ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), 1998.
    • (1998)
    • Broch, J.1    Maltz, D.2    Johnson, D.3    Hu, Y.4    Jetcheva, J.5
  • 17
    • 0036986441 scopus 로고    scopus 로고
    • An on-demand secure routing protocol resilient to byzantine Failures. Proceedings of the 3rd ACM Workshop on Wireless Security
    • Awerbuch B, Holmer D, Nita-Rotaru C, Rubens H. An on-demand secure routing protocol resilient to byzantine Failures. Proceedings of the 3rd ACM Workshop on Wireless Security, 2002.
    • (2002)
    • Awerbuch, B.1    Holmer, D.2    Nita-Rotaru, C.3    Rubens, H.4
  • 18
    • 84947614553 scopus 로고    scopus 로고
    • INSENS: intrusion-tolerant routing in wireless sensor networks. Technical Report CU-CS-939-02, Department of Computer Science, University of Colorado.
    • Deng J, Han R, Mishra S. INSENS: intrusion-tolerant routing in wireless sensor networks. Technical Report CU-CS-939-02, Department of Computer Science, University of Colorado.
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 19
    • 84962808628 scopus 로고    scopus 로고
    • Cooperative security-enforcement routing in mobile ad hoc networks. Proceedings of the 4th International Workshop on Mobile and Wireless Communication Network
    • Lu B, Pooch U. Cooperative security-enforcement routing in mobile ad hoc networks. Proceedings of the 4th International Workshop on Mobile and Wireless Communication Network, 2002.
    • (2002)
    • Lu, B.1    Pooch, U.2
  • 20
    • 84943745348 scopus 로고    scopus 로고
    • Secure link state routing for mobile ad hoc networks. Proceedings of the IEEE Workshop on Security and Assurance in Ad hoc Networks
    • Papadimitratos P, Haas Z. Secure link state routing for mobile ad hoc networks. Proceedings of the IEEE Workshop on Security and Assurance in Ad hoc Networks, 2003.
    • (2003)
    • Papadimitratos, P.1    Haas, Z.2
  • 21
    • 79960417807 scopus 로고    scopus 로고
    • An on-demand secure routing protocol resilient to byzantine failures. Proceedings of the 1st IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks
    • Awerbuch B, Curtmola R, Holmer D, Rubens H, Nita-Rotaru C. An on-demand secure routing protocol resilient to byzantine failures. Proceedings of the 1st IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.
    • (2005)
    • Awerbuch, B.1    Curtmola, R.2    Holmer, D.3    Rubens, H.4    Nita-Rotaru, C.5
  • 22
    • 35248846963 scopus 로고    scopus 로고
    • A performance evaluation of intrusion-tolerant routing in wireless sensor networks. Proceedings of the 2nd IEEE International Workshop on Information Processing in Sensor Networks
    • Deng J, Han R, Mishra S. A performance evaluation of intrusion-tolerant routing in wireless sensor networks. Proceedings of the 2nd IEEE International Workshop on Information Processing in Sensor Networks, 2003.
    • (2003)
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 23
    • 79960406545 scopus 로고    scopus 로고
    • RFC 4728 The Dynamic Source Routing Protocol (DSR)
    • Johnson D, Hu Y, Maltz D. RFC 4728 The Dynamic Source Routing Protocol (DSR), 2007.
    • (2007)
    • Johnson, D.1    Hu, Y.2    Maltz, D.3
  • 24
    • 79960396542 scopus 로고    scopus 로고
    • Efficient and secure source authentication for multicast. Network and Distributed System Security Symposium
    • Perrig A, Canetti R, Song D, Tygar J. Efficient and secure source authentication for multicast. Network and Distributed System Security Symposium, 2001.
    • (2001)
    • Perrig, A.1    Canetti, R.2    Song, D.3    Tygar, J.4
  • 25
    • 0033690336 scopus 로고    scopus 로고
    • Efficient authentication and signing of multicast streams over lossy channels. IEEE Symposium on Security and Privacy
    • Perrig A, Canetti R, Tygar J, Song D. Efficient authentication and signing of multicast streams over lossy channels. IEEE Symposium on Security and Privacy, 2000.
    • (2000)
    • Perrig, A.1    Canetti, R.2    Tygar, J.3    Song, D.4
  • 26
    • 79960417051 scopus 로고    scopus 로고
    • Combining certification-based authentication and intrusion detection to secure Manet Routing Protocols. Proceedings of the 5th European Wireless Conference (Mobile and Wireless Systems beyond 3G)
    • Puttini R, de Sousa R, Mé L. Combining certification-based authentication and intrusion detection to secure Manet Routing Protocols. Proceedings of the 5th European Wireless Conference (Mobile and Wireless Systems beyond 3G), 2004.
    • (2004)
    • Puttini, R.1    de Sousa, R.2    Mé, L.3
  • 27
    • 33749048761 scopus 로고    scopus 로고
    • An effective intrusion detection approach for OLSR MANET protocol. Proceedings of 1st IEEE ICNP Workshop on Secure Network Protocols
    • Wang M, Lamont L, Mason P, Gorlatova M. An effective intrusion detection approach for OLSR MANET protocol. Proceedings of 1st IEEE ICNP Workshop on Secure Network Protocols, 2005.
    • (2005)
    • Wang, M.1    Lamont, L.2    Mason, P.3    Gorlatova, M.4
  • 28
    • 79960395873 scopus 로고    scopus 로고
    • Sensors for Detection of Misbehaving Nodes in MANETs. Praxis der Informationsverarbeitung und Kommunikation (PIK) 01/2005, K.G. Saur, Munich, Germany
    • Kargl F, Schlott S, Weber P. Sensors for Detection of Misbehaving Nodes in MANETs. Praxis der Informationsverarbeitung und Kommunikation (PIK) 01/2005, K.G. Saur, Munich, Germany, 2005.
    • (2005)
    • Kargl, F.1    Schlott, S.2    Weber, P.3
  • 29
    • 79960425470 scopus 로고    scopus 로고
    • Sicherheit in Mobilen Ad hoc Netzwerken. Ph.D. Dissertation, Universität Ulm, in German].
    • Kargl F. Sicherheit in Mobilen Ad hoc Netzwerken. Ph.D. Dissertation, Universität Ulm, 2003 [in German].
    • (2003)
    • Kargl, F.1
  • 30
    • 79960427079 scopus 로고    scopus 로고
    • ns Network Simulator
    • McCanne S, Floyd S. ns Network Simulator, 2006.
    • (2006)
    • McCanne, S.1    Floyd, S.2
  • 32
    • 85017404375 scopus 로고    scopus 로고
    • A group mobility model for ad hoc wireless networks. Proceedings of the 2nd ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems
    • Hong X, Gerla M, Pei G, Chiang C. A group mobility model for ad hoc wireless networks. Proceedings of the 2nd ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 1999.
    • (1999)
    • Hong, X.1    Gerla, M.2    Pei, G.3    Chiang, C.4
  • 33
    • 79960430174 scopus 로고    scopus 로고
    • The spatial node distribution of the random waypoint mobility model. Proceedings of the 1st German Workshop on Mobile Ad-Hoc Networks (WMAN)
    • Bettstetter C, Wagner C. The spatial node distribution of the random waypoint mobility model. Proceedings of the 1st German Workshop on Mobile Ad-Hoc Networks (WMAN), 2002.
    • (2002)
    • Bettstetter, C.1    Wagner, C.2
  • 34
    • 0042014530 scopus 로고    scopus 로고
    • Random waypoint considered harmful. Proceedings of 22nd IEEE Infocom
    • Yoon J, Liu M, Noble B. Random waypoint considered harmful. Proceedings of 22nd IEEE Infocom, 2003.
    • (2003)
    • Yoon, J.1    Liu, M.2    Noble, B.3
  • 35
    • 79960416174 scopus 로고    scopus 로고
    • NATO Standardization Agency. The 1200 and 2400 Bit/s NATO Interoperable Narrowband Voice Coder. STANAG 4591
    • NATO Standardization Agency. The 1200 and 2400 Bit/s NATO Interoperable Narrowband Voice Coder. STANAG 4591, 2002.
    • (2002)
  • 36
    • 79960392209 scopus 로고    scopus 로고
    • Wireless Communications-Principles & Practice. Prentice Hall Communications Engineering and Emerging Technologies Series: Prentice Hall Professional Technical Reference
    • Rappaport TS. Wireless Communications-Principles & Practice. Prentice Hall Communications Engineering and Emerging Technologies Series: Prentice Hall Professional Technical Reference, 1996.
    • (1996)
    • Rappaport, T.S.1
  • 37
    • 84947616815 scopus 로고    scopus 로고
    • MITE-MANET intrusion detection for tactical environments. Proceedings ot the RTO IST-22-PBM Symposium
    • Jahnke M, Aschenbruck N, Gerhards-Padilla E, et al. MITE-MANET intrusion detection for tactical environments. Proceedings ot the RTO IST-22-PBM Symposium, 2008.
    • (2008)
    • Jahnke, M.1    Aschenbruck, N.2    Gerhards-Padilla, E.3
  • 38
    • 79960385775 scopus 로고    scopus 로고
    • Homepage of OpenVZ. OpenVZ
    • Homepage of OpenVZ. OpenVZ, 2009.
    • (2009)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.