메뉴 건너뛰기




Volumn 7, Issue 2, 2014, Pages 376-384

A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks

Author keywords

AES; AODV; Broken links; Cryptography; Malicious nodes; MANET; Message tampering attack; Packet dropping attack; Security; Simulation

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; DATA TRANSFER; MOBILE SECURITY; PACKET LOSS; ROUTERS;

EID: 84893132480     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.731     Document Type: Article
Times cited : (11)

References (18)
  • 2
    • 84893081505 scopus 로고    scopus 로고
    • Global mobile information systems simulation library (GloMoSim), [Aug. 15, 2012].
    • Global mobile information systems simulation library (GloMoSim), 2012. http://pcl.cs.ucla.edu/projects/glomosim/ [Aug. 15, 2012].
    • (2012)
  • 4
    • 38549088052 scopus 로고    scopus 로고
    • Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. In Proc. of the IEEE International Conference on Communications, Vol. 07, June 24-28
    • Nasser N, Yunfeng C. Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks. In Proc. of the IEEE International Conference on Communications, Vol. 07, June 24-28, 2007; 1154-1159.
    • (2007) , pp. 1154-1159
    • Nasser, N.1    Yunfeng, C.2
  • 5
    • 70449436623 scopus 로고    scopus 로고
    • Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks
    • Gonzalez OF, Ansa G, Howarth M, Pavlou G. Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks. Journal of Internet Engineering 2008; 2(1):181-192.
    • (2008) Journal of Internet Engineering , vol.2 , Issue.1 , pp. 181-192
    • Gonzalez, O.F.1    Ansa, G.2    Howarth, M.3    Pavlou, G.4
  • 6
    • 50949092585 scopus 로고    scopus 로고
    • WAP: wormhole attack prevention algorithm in mobile ad hoc networks. In Proc. of the International Conference on Sensor Networks, Ubiquitous & Trustworthy Computing, SUTC'08), Taichung, Taiwan, June 11-13
    • Choi S, Kim D-Y, Lee D-H, Jung J-I. WAP: wormhole attack prevention algorithm in mobile ad hoc networks. In Proc. of the International Conference on Sensor Networks, Ubiquitous & Trustworthy Computing, (SUTC'08), Taichung, Taiwan, June 11-13, 2008; 343-348.
    • (2008) , pp. 343-348
    • Choi, S.1    Kim, D.-Y.2    Lee, D.-H.3    Jung, J.-I.4
  • 8
    • 59649116337 scopus 로고    scopus 로고
    • A secure routing protocol against byzantine attacks for MANETs in adversarial environments
    • Yu M, Zhou M, Su W. A secure routing protocol against byzantine attacks for MANETs in adversarial environments. IEEE Transactions on Vehicular Technology 2009; 58(1):449-460.
    • (2009) IEEE Transactions on Vehicular Technology , vol.58 , Issue.1 , pp. 449-460
    • Yu, M.1    Zhou, M.2    Su, W.3
  • 9
    • 80052176023 scopus 로고    scopus 로고
    • Side channel monitoring: packet drop attack detection in wireless ad hoc networks. In Proc. of the IEEE Intl. Conference on Communications (ICC'11), Kyoto, Japan, June 5-9
    • Li X, Lu R, Liang X, Shen X. Side channel monitoring: packet drop attack detection in wireless ad hoc networks. In Proc. of the IEEE Intl. Conference on Communications (ICC'11), Kyoto, Japan, June 5-9, 2011.
    • (2011)
    • Li, X.1    Lu, R.2    Liang, X.3    Shen, X.4
  • 10
    • 84864195717 scopus 로고    scopus 로고
    • Advanced algorithm for detection and prevention of cooperative black and grayhole attacks in mobile ad hoc networks
    • Jain S, Jain M, Kandwal H. Advanced algorithm for detection and prevention of cooperative black and grayhole attacks in mobile ad hoc networks. International Journal of Computers and Applications 2010; 1(7):37-42.
    • (2010) International Journal of Computers and Applications , vol.1 , Issue.7 , pp. 37-42
    • Jain, S.1    Jain, M.2    Kandwal, H.3
  • 11
    • 84860761299 scopus 로고    scopus 로고
    • E2SIW: an energy efficient scheme immune to wormhole attacks in wireless ad hoc networks. In Proc. of the 8th Intl. Workshop on Heterogeneous Wireless Networks (HWISE'12), held in conjunction with AINA 2012, Fukuoka, Japan, March 26-29
    • Dhurandher SK, Woungang I, Gupta A, Bhargava B. E2SIW: an energy efficient scheme immune to wormhole attacks in wireless ad hoc networks. In Proc. of the 8th Intl. Workshop on Heterogeneous Wireless Networks (HWISE'12), held in conjunction with AINA 2012, Fukuoka, Japan, March 26-29, 2012.
    • (2012)
    • Dhurandher, S.K.1    Woungang, I.2    Gupta, A.3    Bhargava, B.4
  • 12
    • 84863178488 scopus 로고    scopus 로고
    • Message security in multipath ad hoc networks using a neural network-based cipher. In Proc. of the IEEE GLOBECOM 2011, Houston, Texas, USA, Dec. 5-9
    • Liu C, Woungang I, Chao H-C, Dhurandher SK, Chi T-Y, Obaidat MS. Message security in multipath ad hoc networks using a neural network-based cipher. In Proc. of the IEEE GLOBECOM 2011, Houston, Texas, USA, Dec. 5-9, 2011.
    • (2011)
    • Liu, C.1    Woungang, I.2    Chao, H.-C.3    Dhurandher, S.K.4    Chi, T.-Y.5    Obaidat, M.S.6
  • 13
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: a defence against wormhole attacks in wireless networks. In Proc. of INFOCOM 2003, Vol. 3
    • Hu Y, Perrig A, Johnson D. Packet leashes: a defence against wormhole attacks in wireless networks. In Proc. of INFOCOM 2003, Vol. 3, 2003; 1976-1986.
    • (2003) , pp. 1976-1986
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 14
    • 46149096001 scopus 로고    scopus 로고
    • TrueLink: a practical countermeasure to the wormhole attack in wireless networks. In Proc. of 14th Intl. Conference on Network Protocols (ICNP'06), Santa Barbara, CA, USA, Nov. 12-15
    • Eriksson J, Krishnamurthy SV, Faloutsos M. TrueLink: a practical countermeasure to the wormhole attack in wireless networks. In Proc. of 14th Intl. Conference on Network Protocols (ICNP'06), Santa Barbara, CA, USA, Nov. 12-15, 2006; 75-84.
    • (2006) , pp. 75-84
    • Eriksson, J.1    Krishnamurthy, S.V.2    Faloutsos, M.3
  • 16
    • 34548321774 scopus 로고    scopus 로고
    • Detecting wormhole attacks in wireless networks using conectivity information. In Proc. of 26th IEEE INFOCOM'07, Anchorage, Alaska, USA, May 6-12
    • Maheshwari R, Gao J, Das SR. Detecting wormhole attacks in wireless networks using conectivity information. In Proc. of 26th IEEE INFOCOM'07, Anchorage, Alaska, USA, May 6-12, 2007; 107-115.
    • (2007) , pp. 107-115
    • Maheshwari, R.1    Gao, J.2    Das, S.R.3
  • 17
    • 84864257708 scopus 로고    scopus 로고
    • Preventing packet dropping and message tampering attacks on aodv-based mobile ad hoc networks. In Press, Proc. of the Intl. Conference on Computer, Information and Telecommunication Systems (CITS 2012), Amman, Jordan, May 13-16
    • Obaidat MS, Woungang I, Dhurandher SK, Koo V. Preventing packet dropping and message tampering attacks on aodv-based mobile ad hoc networks. In Press, Proc. of the Intl. Conference on Computer, Information and Telecommunication Systems (CITS 2012), Amman, Jordan, May 13-16, 2012.
    • (2012)
    • Obaidat, M.S.1    Woungang, I.2    Dhurandher, S.K.3    Koo, V.4
  • 18
    • 77949289802 scopus 로고    scopus 로고
    • Timing evaluation of the known cryptographic algorithms. In Proc. of the Intl. Conference on Computational Intelligence and Security (CIS '09), Beijing, China, Dec. 11-14
    • Wang Y, Hu M. Timing evaluation of the known cryptographic algorithms. In Proc. of the Intl. Conference on Computational Intelligence and Security (CIS '09), Beijing, China, Dec. 11-14, 2009; 233-237.
    • (2009) , pp. 233-237
    • Wang, Y.1    Hu, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.