메뉴 건너뛰기




Volumn 4, Issue 5, 2014, Pages 168-179

A review: Mobile Ad Hoc networks challenges, attacks, security, vulnerability and routing protocols

Author keywords

Intrusion Detection; Mobile Ad Hoc Networks; Routing Protocols; Security; Wormholes

Indexed keywords


EID: 84922832566     PISSN: 20395086     EISSN: 25332929     Source Type: Journal    
DOI: 10.15866/irecap.v4i5.3001     Document Type: Article
Times cited : (22)

References (75)
  • 4
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Springer
    • [4] Johnson, D.B. and D.A. Maltz, Dynamic source routing in ad hoc wireless networks, in Mobile computing. 1996, Springer. p. 153-181.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 12
    • 84857170447 scopus 로고    scopus 로고
    • Thesis Paper submitted to the Department of Computer Science, Naval Post Graduate School, Monterey, CA
    • [12] Thong, L.K., Performance Analysis of Mobile Adhoc Network Routing Protocols. 2004, Thesis Paper submitted to the Department of Computer Science, Naval Post Graduate School, Monterey, CA.
    • (2004) Performance Analysis of Mobile Adhoc Network Routing Protocols
    • Thong, L.K.1
  • 13
    • 33644596361 scopus 로고    scopus 로고
    • Performance analysis of three routing protocols in wireless mobile ad hoc networks
    • [13] Lakshmi, M. and P. Sankaranarayanan, Performance analysis of three routing protocols in wireless mobile ad hoc networks. Information technology journal, 2006. 5(1): p. 114-120.
    • (2006) Information Technology Journal , vol.5 , Issue.1 , pp. 114-120
    • Lakshmi, M.1    Sankaranarayanan, P.2
  • 16
    • 84977898401 scopus 로고    scopus 로고
    • Using Directional Antennas to Prevent Wormhole Attacks
    • [16] Hu, L. and D. Evans. Using Directional Antennas to Prevent Wormhole Attacks. in NDSS. 2004.
    • (2004) NDSS
    • Hu, L.1    Evans, D.2
  • 18
    • 56749164933 scopus 로고    scopus 로고
    • Wormeros: A new framework for defending against wormhole attacks on wireless ad hoc networks
    • Springer
    • Vu, H., et al., Wormeros: A new framework for defending against wormhole attacks on wireless ad hoc networks, in Wireless Algorithms, Systems, and Applications. 2008, Springer. p. 491-502.
    • (2008) Wireless Algorithms, Systems, and Applications , pp. 491-502
    • Vu, H.1
  • 19
    • 38549151872 scopus 로고    scopus 로고
    • On mitigating in-band wormhole attacks in mobile ad hoc networks. In Communications
    • IEEE
    • [19] Su, X. and R.V. Boppana. On mitigating in-band wormhole attacks in mobile ad hoc networks. in Communications, 2007. ICC'07. IEEE International Conference on. 2007. IEEE.
    • (2007) 2007. ICC'07. IEEE International Conference On
    • Su, X.1    Boppana, R.V.2
  • 20
    • 35148886678 scopus 로고    scopus 로고
    • Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis
    • MILCOM 2006. IEEE. 2006. IEEE
    • [20] Gorlatova, M.A., et al. Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis. in Military Communications Conference, 2006. MILCOM 2006. IEEE. 2006. IEEE.
    • (2006) Military Communications Conference,
    • Gorlatova, M.A.1
  • 24
    • 84861436103 scopus 로고    scopus 로고
    • Detection and prevention of wormhole attacks in MANETs using path tracing approach
    • [24] Sakthivel, T. and R. Chandrasekaran, Detection and prevention of wormhole attacks in MANETs using path tracing approach. European Journal of Scientific Research, 2012. 76(2): p. 240-252.
    • (2012) European Journal of Scientific Research , vol.76 , Issue.2 , pp. 240-252
    • Sakthivel, T.1    Chandrasekaran, R.2
  • 25
    • 84861460273 scopus 로고    scopus 로고
    • Usor: An unobservable secure ondemand routing protocol for mobile ad hoc networks
    • [25] Wan, Z., K. Ren, and M. Gu, Usor: An unobservable secure ondemand routing protocol for mobile ad hoc networks. Wireless Communications, IEEE Transactions on, 2012. 11(5): p. 1922-1932.
    • (2012) Wireless Communications, IEEE Transactions On , vol.11 , Issue.5 , pp. 1922-1932
    • Wan, Z.1    Ren, K.2    Gu, M.3
  • 28
    • 42649100347 scopus 로고    scopus 로고
    • Detecting and avoiding wormhole attacks in wireless ad hoc networks
    • [28] Naït-Abdesselam, F., Detecting and avoiding wormhole attacks in wireless ad hoc networks. Communications Magazine, IEEE, 2008. 46(4): p. 127-133.
    • (2008) Communications Magazine, IEEE , vol.46 , Issue.4 , pp. 127-133
    • Naït-Abdesselam, F.1
  • 29
    • 48049122172 scopus 로고    scopus 로고
    • Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR
    • 2007. IEEE. 2007. IEEE
    • [29] Baras, J.S., et al. Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR. in Military Communications Conference, 2007. MILCOM 2007. IEEE. 2007. IEEE.
    • Military Communications Conference, 2007. MILCOM
    • Baras, J.S.1
  • 30
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure ondemand routing protocol for ad hoc networks
    • [30] Hu, Y.-C., A. Perrig, and D.B. Johnson, Ariadne: A secure ondemand routing protocol for ad hoc networks. Wireless networks, 2005. 11(1-2): p. 21-38.
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 33
    • 37549006809 scopus 로고    scopus 로고
    • MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks
    • [33] Khalil, I., S. Bagchi, and N.B. Shroff, MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Networks, 2008. 6(3): p. 344-362.
    • (2008) Ad Hoc Networks , vol.6 , Issue.3 , pp. 344-362
    • Khalil, I.1    Bagchi, S.2    Shroff, N.B.3
  • 34
    • 85031307530 scopus 로고
    • Highly dynamic destinationsequenced distance-vector routing (DSDV) for mobile computers
    • ACM
    • [34] Perkins, C.E. and P. Bhagwat. Highly dynamic destinationsequenced distance-vector routing (DSDV) for mobile computers. in ACM SIGCOMM Computer Communication Review. 1994. ACM.
    • (1994) ACM SIGCOMM Computer Communication Review
    • Perkins, C.E.1    Bhagwat, P.2
  • 35
    • 84860282979 scopus 로고    scopus 로고
    • Efficient self-organized backbone formation in mobile ad hoc networks (MANETs)
    • [35] Smys, S. and G. Josemin Bala, Efficient self-organized backbone formation in mobile ad hoc networks (MANETs). Computers & Electrical Engineering, 2012. 38(3): p. 522-532.
    • (2012) Computers & Electrical Engineering , vol.38 , Issue.3 , pp. 522-532
    • Smys, S.1    Bala, G.J.2
  • 42
    • 32844458902 scopus 로고    scopus 로고
    • Exploring mesh and tree-based multicast. Routing protocols for MANETs
    • [42] Viswanath, K., K. Obraczka, and G. Tsudik, Exploring mesh and tree-based multicast. Routing protocols for MANETs. Mobile Computing, IEEE Transactions on, 2006. 5(1): p. 28-42.
    • (2006) Mobile Computing, IEEE Transactions On , vol.5 , Issue.1 , pp. 28-42
    • Viswanath, K.1    Obraczka, K.2    Tsudik, G.3
  • 43
    • 85015373329 scopus 로고    scopus 로고
    • A flexible quality of service model for mobile adhoc networks
    • VTC 2000-Spring Tokyo. 2000 IEEE 51st. 2000. IEEE
    • Xiao, H., et al. A flexible quality of service model for mobile adhoc networks. in Vehicular Technology Conference Proceedings, 2000. VTC 2000-Spring Tokyo. 2000 IEEE 51st. 2000. IEEE.
    • (2000) Vehicular Technology Conference Proceedings
    • Xiao, H.1
  • 48
    • 18944373619 scopus 로고    scopus 로고
    • An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks
    • [48] Boukerche, A., et al., An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. computer communications, 2005. 28(10): p. 1193-1203.
    • (2005) Computer Communications , vol.28 , Issue.10 , pp. 1193-1203
    • Boukerche, A.1
  • 50
    • 78049409502 scopus 로고    scopus 로고
    • Security Enhancement for Authentication of nodes in MANET by checking the CRL status of Servers
    • Springer
    • Irshad, A., et al., Security Enhancement for Authentication of nodes in MANET by checking the CRL status of Servers, in Security-Enriched Urban Computing and Smart Grid. 2010, Springer. p. 86-95.
    • (2010) Security-Enriched Urban Computing and Smart Grid , pp. 86-95
    • Irshad, A.1
  • 54
    • 84922787629 scopus 로고    scopus 로고
    • QoS issues using probabilistic non-reputation protocol in Mobile Ad Hoc Network environment
    • [54] Chi, L., QoS issues using probabilistic non-reputation protocol in Mobile Ad Hoc Network environment, in Australian Information Security Management Conference. 2006.
    • (2006) Australian Information Security Management Conference
    • Chi, L.1
  • 55
    • 79551689325 scopus 로고    scopus 로고
    • K-directory community: Reliable service discovery in MANET
    • [55] Raychoudhury, V., et al., K-directory community: reliable service discovery in MANET. Pervasive and mobile computing, 2011. 7(1): p. 140-158.
    • (2011) Pervasive and Mobile Computing , vol.7 , Issue.1 , pp. 140-158
    • Raychoudhury, V.1
  • 56
    • 84879364254 scopus 로고    scopus 로고
    • Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks
    • [56] Lv, X. and H. Li, Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. IET Information Security, 2013. 7(2): p. 61-66.
    • (2013) IET Information Security , vol.7 , Issue.2 , pp. 61-66
    • Lv, X.1    Li, H.2
  • 58
    • 78149465598 scopus 로고    scopus 로고
    • Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
    • [58] Su, M.-Y., Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, 2011. 34(1): p. 107-117.
    • (2011) Computer Communications , vol.34 , Issue.1 , pp. 107-117
    • Su, M.-Y.1
  • 60
    • 33847326711 scopus 로고    scopus 로고
    • Packet drop attack: A serious threat to operational mobile ad hoc networks
    • [60] Balakrishnan, V. and V. Varadharajan, Packet drop attack: A serious threat to operational mobile ad hoc networks. Networks and Communication Systems, 2005: p. 18-25.
    • (2005) Networks and Communication Systems , pp. 18-25
    • Balakrishnan, V.1    Varadharajan, V.2
  • 62
    • 58149526685 scopus 로고    scopus 로고
    • Defending mechanisms against Sybil attack in next generation mobile ad hoc networks
    • [62] Pal, S., A.K. Mukhopadhyay, and P.P. Bhattacharya, Defending mechanisms against Sybil attack in next generation mobile ad hoc networks. IETE Technical Review, 2008. 25(4): p. 209.
    • (2008) IETE Technical Review , vol.25 , Issue.4 , pp. 209
    • Pal, S.1    Mukhopadhyay, A.K.2    Bhattacharya, P.P.3
  • 70
    • 84873304281 scopus 로고    scopus 로고
    • An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing
    • [70] Sengan, S., Chethur Pandian, S., An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3037-3041.
    • (2012) International Review on Computers and Software (IRECOS) , vol.7 , Issue.6 , pp. 3037-3041
    • Sengan, S.1    Pandian, S.C.2
  • 71
    • 84873324098 scopus 로고    scopus 로고
    • Group mobility judge based on node's neighbors matrix in clustering MANET
    • [71] Jiang, H., Zhang, S., Shao, G., Group mobility judge based on node's neighbors matrix in clustering MANET, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 2886-2890.
    • (2012) International Review on Computers and Software (IRECOS) , vol.7 , Issue.6 , pp. 2886-2890
    • Jiang, H.1    Zhang, S.2    Shao, G.3
  • 72
    • 84864345864 scopus 로고    scopus 로고
    • TSRD-RL algorithm based secured route discovery for MANET with improved route lifetime
    • [72] Priyadarsini, S., Umashankar, S., TSRD-RL algorithm based secured route discovery for MANET with improved route lifetime, (2012) International Review on Computers and Software (IRECOS), 7 (2), pp. 499-504.
    • (2012) International Review on Computers and Software (IRECOS) , vol.7 , Issue.2 , pp. 499-504
    • Priyadarsini, S.1    Umashankar, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.