作者: John Felix Charles Joseph , Amitabha Das , Bu-Sung Lee
DOI: 10.1007/978-1-84800-328-6_18
关键词: Adaptive quality of service multi-hop routing 、 Vehicular ad hoc network 、 Computer science 、 Wireless network 、 Computer network 、 Wireless ad hoc network 、 Wireless Routing Protocol 、 Geocast 、 Ad hoc wireless distribution service 、 Routing protocol 、 Optimized Link State Routing Protocol 、 Mobile ad hoc network
摘要: The lack of infrastructure and centralized nodes in ad hoc networks have made to depend on the cooperative nature neighbor for critical services like routing maintenance. This unique network’s mechanism has spawned unprecedented security threats protocol. Attackers potential directly disrupt protocol communications, which is transparent conventional wired wireless networks. A attack scenario composed a sequence behaviors, an behavior elementary executed particular fashion. chapter enumerates detail scenarios their elements. Also, introduces threat analysis that used explore different behaviors protocols. observations are useful understanding vulnerabilities realizing requisites system design