메뉴 건너뛰기




Volumn 12, Issue 10, 2013, Pages 5124-5137

FADE: Forwarding assessment based detection of collaborative grey hole attacks in wmns

Author keywords

collaborative grey hole attack; forwarding assessment based detection; optimal detection thresholds; two hop acknowledgement; Wireless mesh network

Indexed keywords

COLLABORATIVE GREY HOLE ATTACK; DENIAL OF SERVICE ATTACKS; EXTENSIVE SIMULATIONS; FALSE POSITIVE RATES; OPTIMAL DETECTION; SELECTIVE FORWARDING; TWO-HOP ACKNOWLEDGEMENT; WIRELESS MESH NETWORKS (WMNS);

EID: 84890127638     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2013.121906     Document Type: Article
Times cited : (45)

References (47)
  • 1
    • 13844296355 scopus 로고    scopus 로고
    • Wireless mesh networks: A survey
    • DOI 10.1016/j.comnet.2004.12.001, PII S1389128604003457
    • I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Comput. Netw., vol. 47, no. 4, pp. 445-487, 2005. (Pubitemid 40242422)
    • (2005) Computer Networks , vol.47 , Issue.4 , pp. 445-487
    • Akyildiz, I.F.1    Wang, X.2    Wang, W.3
  • 2
    • 0141981548 scopus 로고    scopus 로고
    • IEEE Standard for Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications
    • (Revision of IEEE Std 802.11-2007)
    • IEEE Standard for Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, IEEE Std. 802.11-2012 (Revision of IEEE Std 802.11-2007), 2012.
    • (2012) IEEE Std. 802.11 2012
  • 3
    • 48649095029 scopus 로고    scopus 로고
    • An efficient countermeasure to the selective forwarding attack in wireless sensor networks
    • H.-M. Sun, C.-M. Chen, and Y.-C. Hsiao, "An efficient countermeasure to the selective forwarding attack in wireless sensor networks," in Proc. 2007 TENCON, pp. 1-4.
    • Proc. 2007 TENCON , pp. 1-4
    • Sun, H.-M.1    Chen, C.-M.2    Hsiao, Y.-C.3
  • 4
    • 77749339862 scopus 로고    scopus 로고
    • Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information
    • M. Tiwari, K. V. Arya, R. Choudhari, and K. S. Choudhary, "Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information," in Proc. 2009 ICCIT, pp. 824-828.
    • Proc. 2009 ICCIT , pp. 824-828
    • Tiwari, M.1    Arya, K.V.2    Choudhari, R.3    Choudhary, K.S.4
  • 5
    • 70349743699 scopus 로고    scopus 로고
    • Unmask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks
    • I. Khalil, S. Bagchi, C. N. Rotaru, and N. B. Shroff, "Unmask: utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks," Ad Hoc Netw., vol. 8, no. 2, pp. 148-164, 2010.
    • (2010) Ad Hoc Netw. , vol.8 , Issue.2 , pp. 148-164
    • Khalil, I.1    Bagchi, S.2    Rotaru, C.N.3    Shroff, N.B.4
  • 6
    • 84872774058 scopus 로고    scopus 로고
    • MDS-based wormhole detection using local topology in wireless sensor networks
    • Article ID 145702
    • X. Lu, D. Dong, and X. Liao, "MDS-based wormhole detection using local topology in wireless sensor networks," Int. J. Distributed Sensor Netw., vol. 2012, Article ID 145702, 9 pages, 2012.
    • (2012) Int. J. Distributed Sensor Netw. 2012 , pp. 9
    • Lu, X.1    Dong, D.2    Liao, X.3
  • 7
    • 34548031104 scopus 로고    scopus 로고
    • An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
    • DOI 10.1016/j.comcom.2007.04.025, PII S0140366407001740
    • E. C. H. Ngai, J. Liu, and M. R. Lyu, "An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks," Comput. Commun., vol. 30, no. 11-12, pp. 2353-2364, 2007. (Pubitemid 47285290)
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2353-2364
    • Ngai, E.C.H.1    Liu, J.2    Lyu, M.R.3
  • 8
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 2000 Mobicom, pp. 255-265.
    • Proc. 2000 Mobicom , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 9
    • 67249141928 scopus 로고    scopus 로고
    • A reputation-based metric for secure routing in wireless mesh networks
    • F. Oliviero and S. P. Romano, "A reputation-based metric for secure routing in wireless mesh networks," in Proc. 2008 GLOBECOM, pp. 1-5.
    • Proc. 2008 GLOBECOM , pp. 1-5
    • Oliviero, F.1    Romano, S.P.2
  • 10
    • 77952255404 scopus 로고    scopus 로고
    • Mitigating selective forwarding attacks with a channel-aware approach in WMNs
    • D. M. Shila, Y. Cheng, and T. Anjali, "Mitigating selective forwarding attacks with a channel-aware approach in WMNs," IEEE Trans. Wireless Commun., vol. 9, no. 5, pp. 1661-1675, 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.5 , pp. 1661-1675
    • Shila, D.M.1    Cheng, Y.2    Anjali, T.3
  • 11
    • 34548852836 scopus 로고    scopus 로고
    • CHEMAS: Identify suspect nodes in selective forwarding attacks
    • DOI 10.1016/j.jpdc.2007.04.014, PII S0743731507000718
    • B. Xiao, B. Yu, and C. Gao, "Chemas: identify suspect nodes in selective forwarding attacks," J. Parallel Distributed Comput., vol. 67, pp. 1218-1230, 2007. (Pubitemid 47446131)
    • (2007) Journal of Parallel and Distributed Computing , vol.67 , Issue.11 , pp. 1218-1230
    • Xiao, B.1    Yu, B.2    Gao, C.3
  • 12
    • 41449098948 scopus 로고    scopus 로고
    • LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    • DOI 10.1109/TMC.2007.70753, 4358997
    • K. Ren, W. Lou, and Y. Zhang, "LEDs: providing location-aware endto-end data security in wireless sensor networks," IEEE Trans. Mobile Comput., vol. 7, no. 5, pp. 585-598, 2008. (Pubitemid 351454006)
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.5 , pp. 585-598
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 13
    • 51249104865 scopus 로고    scopus 로고
    • Detection of selective forwarding attacks in heterogeneous sensor networks
    • J. Brown and X. Du, "Detection of selective forwarding attacks in heterogeneous sensor networks," in Proc. 2008 ICC, pp. 1583-1587.
    • Proc. 2008 ICC , pp. 1583-1587
    • Brown, J.1    Du, X.2
  • 14
    • 70349734493 scopus 로고    scopus 로고
    • An authentication scheme for locating compromised sensor nodes in WSNs
    • Y. Zhang, J. Yang, W. Li, L. Wang, and L. Jin, "An authentication scheme for locating compromised sensor nodes in WSNs," J. Netw. Comput. Applicat., vol. 33, no. 1, pp. 50-62, 2010.
    • (2010) J. Netw. Comput. Applicat. , vol.33 , Issue.1 , pp. 50-62
    • Zhang, Y.1    Yang, J.2    Li, W.3    Wang, L.4    Jin, L.5
  • 15
    • 77952310498 scopus 로고    scopus 로고
    • A secure routing protocol for wireless sensor networks
    • ICCSA 2010, ser Springer Berlin Heidelberg, 2010
    • J. Sen and A. Ukil, "A secure routing protocol for wireless sensor networks," in ICCSA 2010, ser. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2010, vol. 6018, pp. 277-290.
    • Lecture Notes in Computer Science. , vol.6018 , pp. 277-290
    • Sen, J.1    Ukil, A.2
  • 16
    • 77957941365 scopus 로고    scopus 로고
    • Toward resilient routing in wireless sensor networks: Gradient-based routing in focus
    • O. Erdene-Ochir, M. Minier, F. Valois, and A. Kountouris, "Toward resilient routing in wireless sensor networks: gradient-based routing in focus," in Proc. 2010 SENSORCOMM, pp. 478-483.
    • Proc. 2010 SENSORCOMM , pp. 478-483
    • Erdene-Ochir, O.1    Minier, M.2    Valois, F.3    Kountouris, A.4
  • 17
    • 82955163119 scopus 로고    scopus 로고
    • A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
    • F. L. Fessant, A. Papadimitriou, A. C. Viana, C. Sengul, and E. Palomar, "A sinkhole resilient protocol for wireless sensor networks: performance and security analysis," Comput. Commun., vol. 35, no. 2, pp. 234-248, 2012.
    • (2012) Comput. Commun. , vol.35 , Issue.2 , pp. 234-248
    • Fessant, F.L.1    Papadimitriou, A.2    Viana, A.C.3    Sengul, C.4    Palomar, E.5
  • 18
    • 53249147143 scopus 로고    scopus 로고
    • A survey of game-theoretic approaches in wireless sensor networks
    • R. Machado and S. Tekinay, "A survey of game-theoretic approaches in wireless sensor networks," Comput. Netw., vol. 52, no. 16, pp. 3047-3061, 2008.
    • (2008) Comput. Netw. , vol.52 , Issue.16 , pp. 3047-3061
    • MacHado, R.1    Tekinay, S.2
  • 19
    • 32644453532 scopus 로고    scopus 로고
    • Security enforcement in wireless sensor networks: A framework based on non-cooperative games
    • DOI 10.1016/j.pmcj.2005.12.001, PII S1574119205000714, Security in Wireless Mobile Computing Systems
    • A. Agah, K. Basu, and S. K. Das, "Security enforcement in wireless sensor networks: a framework based on non-cooperative games," Pervasive Mobile Comput., vol. 2, no. 2, pp. 137-158, 2006. (Pubitemid 43243856)
    • (2006) Pervasive and Mobile Computing , vol.2 , Issue.2 , pp. 137-158
    • Agah, A.1    Basu, K.2    Das, S.K.3
  • 20
    • 79955681745 scopus 로고    scopus 로고
    • Game theory model for selective forward attacks in wireless sensor networks
    • Y. B. Reddy and S. Srivathsan, "Game theory model for selective forward attacks in wireless sensor networks," in Proc. 2009 MED, pp. 458-463.
    • Proc. 2009 MED , pp. 458-463
    • Reddy, Y.B.1    Srivathsan, S.2
  • 21
    • 84886530194 scopus 로고    scopus 로고
    • Detection of colluding selective forwarding nodes in wireless mesh networks based on channel aware detection algorithm
    • V. V. V
    • V. V. V and V. M. A. Rajam, "Detection of colluding selective forwarding nodes in wireless mesh networks based on channel aware detection algorithm," MES J. Technol. Manage., pp. 62-66, 2011.
    • MES J. Technol. Manage. , Issue.2011 , pp. 62-66
    • Rajam, V.M.A.1
  • 22
    • 77955715403 scopus 로고    scopus 로고
    • An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks
    • S. Misra, P. V. Krishna, K. I. Abraham, N. Sasikumar, and S. Fredun, "An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks," Comput. Mathematics Applicat., vol. 60, no. 2, pp. 294-306, 2010.
    • (2010) Comput. Mathematics Applicat. , vol.60 , Issue.2 , pp. 294-306
    • Misra, S.1    Krishna, P.V.2    Abraham, K.I.3    Sasikumar, N.4    Fredun, S.5
  • 23
    • 79952931949 scopus 로고    scopus 로고
    • Secure high-throughput multicast routing in wireless mesh networks
    • J. Dong, R. Curtmola, and C. Nita-Rotaru, "Secure high-throughput multicast routing in wireless mesh networks," IEEE Trans. Mobile Comput., vol. 10, no. 5, pp. 653-668, 2011.
    • (2011) IEEE Trans. Mobile Comput. , vol.10 , Issue.5 , pp. 653-668
    • Dong, J.1    Curtmola, R.2    Nita-Rotaru, C.3
  • 24
    • 84944925335 scopus 로고    scopus 로고
    • Defending against collaborative packet drop attacks on manets
    • W. Wang, B. Bhargava, and M. Linderman, "Defending against collaborative packet drop attacks on manets," in 2009 DNCMS.
    • 2009 DNCMS
    • Wang, W.1    Bhargava, B.2    Linderman, M.3
  • 25
    • 84873323007 scopus 로고    scopus 로고
    • Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks
    • S. Banerjee, "Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks," in 2008 WCECS.
    • 2008 WCECS
    • Banerjee, S.1
  • 27
    • 77954758626 scopus 로고    scopus 로고
    • SRPM: Secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks
    • S. Khan, K.-K. Loo, N. Mast, and T. Naeem, "SRPM: secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks," J. Netw. Syst. Manage., vol. 18, no. 2, pp. 190-209, 2010.
    • (2010) J. Netw. Syst. Manage. , vol.18 , Issue.2 , pp. 190-209
    • Khan, S.1    Loo, K.-K.2    Mast, N.3    Naeem, T.4
  • 28
    • 84856717994 scopus 로고    scopus 로고
    • Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks
    • S. Khan and J. Loo, "Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks," Wireless Pers. Commun., vol. 62, no. 1, pp. 201-214, 2012.
    • (2012) Wireless Pers. Commun. , vol.62 , Issue.1 , pp. 201-214
    • Khan, S.1    Loo, J.2
  • 30
    • 74449087312 scopus 로고    scopus 로고
    • A global security architecture for operated hybrid WLAN mesh networks
    • V. Toubiana, H. Labiod, L. Reynaud, and Y. Gourhant, "A global security architecture for operated hybrid WLAN mesh networks," Comput. Netw., vol. 54, no. 2, pp. 218-230, 2010.
    • (2010) Comput. Netw. , vol.54 , Issue.2 , pp. 218-230
    • Toubiana, V.1    Labiod, H.2    Reynaud, L.3    Gourhant, Y.4
  • 33
    • 0742292815 scopus 로고    scopus 로고
    • Ad hoc on-Demand distance vector (AODV) routing
    • July Available
    • C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (AODV) routing," IETF RFC 3561, July 2003. Available: http://tools.ietf.org/html/rfc3561
    • (2003) IETF RFC , vol.3561
    • Perkins, C.1    Belding-Royer, E.2    Das, S.3
  • 34
    • 82155166330 scopus 로고    scopus 로고
    • Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
    • M. Omar, Y. Challal, and A. Bouabdallah, "Certification-based trust models in mobile ad hoc networks: a survey and taxonomy," J. Netw. Comput. Applicat., vol. 35, no. 1, p. 268-286, 2012.
    • (2012) J. Netw. Comput. Applicat. , vol.35 , Issue.1 , pp. 268-286
    • Omar, M.1    Challal, Y.2    Bouabdallah, A.3
  • 35
    • 79251595067 scopus 로고    scopus 로고
    • Proxy encryption based secure multicast in wireless mesh networks
    • Y. Han, X. Gui, X. Wu, and X. Yang, "Proxy encryption based secure multicast in wireless mesh networks," J. Netw. Comput. Applicat., vol. 34, no. 2, pp. 469-477, 2011.
    • (2011) J. Netw. Comput. Applicat. , vol.34 , Issue.2 , pp. 469-477
    • Han, Y.1    Gui, X.2    Wu, X.3    Yang, X.4
  • 36
    • 80052337836 scopus 로고    scopus 로고
    • Secret key generation exploiting channel characteristics in wireless communications
    • K. Ren, H. Su, and Q. Wang, "Secret key generation exploiting channel characteristics in wireless communications," IEEE Wireless Commun., vol. 18, no. 4, pp. 6-12, 2011.
    • (2011) IEEE Wireless Commun. , vol.18 , Issue.4 , pp. 6-12
    • Ren, K.1    Su, H.2    Wang, Q.3
  • 37
    • 79251633483 scopus 로고    scopus 로고
    • Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks
    • Article No. 16
    • R. Azarderskhsh and A. Reyhani-Masoleh, "Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks," EURASIP J. Wireless Commun. Netw., vol. 2011, Article No. 16, 12 pages, 2011.
    • (2011) EURASIP J. Wireless Commun. Netw. 2011 , pp. 12
    • Azarderskhsh, R.1    Reyhani-Masoleh, A.2
  • 38
    • 79251618754 scopus 로고    scopus 로고
    • Efficient public key certificate management for mobile ad hoc networks
    • Article No. 18
    • P. Caballero-Gil and C. Herńandez-Goya, "Efficient public key certificate management for mobile ad hoc networks," EURASIP J. Wireless Commun. Netw., vol. 2011, Article No. 18, 11 pages, 2011.
    • (2011) EURASIP J. Wireless Commun. Netw. 2011 , pp. 11
    • Caballero-Gil, P.1    Herńandez-Goya, C.2
  • 40
    • 84957364590 scopus 로고    scopus 로고
    • A new paradigm for collision-free hashing: Incrementality at reduced cost
    • Available
    • M. Bellare and D. Micciancio, "A new paradigm for collision-free hashing: incrementality at reduced cost," in 1997 EUROCRYPT, pp. 163-192. Available: http://dl.acm.org/citation.cfm?id=1754542.1754560
    • 1997 EUROCRYPT , pp. 163-192
    • Bellare, M.1    Micciancio, D.2
  • 41
    • 0142002511 scopus 로고    scopus 로고
    • The elliptic curve digital signature algorithm (ECDSA)
    • D. Johnson, A. Menezes, and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)," Int. J. Inf. Security, vol. 1, no. 1, pp. 36-63, 2001.
    • (2001) Int. J. Inf. Security , vol.1 , Issue.1 , pp. 36-63
    • Johnson, D.1    Menezes, A.2    Vanstone, S.3
  • 42
    • 84890116809 scopus 로고    scopus 로고
    • Applied Cryptography
    • InTech
    • J. Sen, Applied Cryptography and Network Security. InTech, 2012.
    • (2012) Network Security
    • Sen, J.1
  • 43
    • 2442551009 scopus 로고    scopus 로고
    • Optimized link state routing protocol (olsr)
    • Oct. Available
    • T. Clausen and P. Jacquet, "Optimized link state routing protocol (olsr)," IETF RFC 3626, Oct. 2003. Available: http://tools.ietf.org/html/ rfc3626
    • (2003) IETF RFC , vol.3626
    • Clausen, T.1    Jacquet, P.2
  • 44
    • 1542265638 scopus 로고    scopus 로고
    • Us secure hash algorithm 1 (sha1)
    • Sept Available
    • D. Eastlake and P. Jones, "Us secure hash algorithm 1 (sha1)," IETF RFC 3174, Sept. 2001. Available: http://tools.ietf.org/html/rfc3174
    • (2001) IETF RFC , vol.3174
    • Eastlake, D.1    Jones, P.2
  • 45
    • 50049106991 scopus 로고    scopus 로고
    • Adaptive FECbased packet loss resilience scheme for supporting voice communication over ad hoc wireless networks
    • V. R. Gandikota, B. R. Tamma, and C. S. R. Murthy, "Adaptive FECbased packet loss resilience scheme for supporting voice communication over ad hoc wireless networks," IEEE Trans. Mobile Comput., vol. 7, no. 10, pp. 1184-1199, 2008.
    • (2008) IEEE Trans. Mobile Comput. , vol.7 , Issue.10 , pp. 1184-1199
    • Gandikota, V.R.1    Tamma, B.R.2    Murthy, C.S.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.