Security Threats in Ad Hoc Routing Protocols

作者: John Felix Charles Joseph , Amitabha Das , Bu-Sung Lee

DOI: 10.1007/978-1-84800-328-6_18

关键词: Adaptive quality of service multi-hop routingVehicular ad hoc networkComputer scienceWireless networkComputer networkWireless ad hoc networkWireless Routing ProtocolGeocastAd hoc wireless distribution serviceRouting protocolOptimized Link State Routing ProtocolMobile ad hoc network

摘要: The lack of infrastructure and centralized nodes in ad hoc networks have made to depend on the cooperative nature neighbor for critical services like routing maintenance. This unique network’s mechanism has spawned unprecedented security threats protocol. Attackers potential directly disrupt protocol communications, which is transparent conventional wired wireless networks. A attack scenario composed a sequence behaviors, an behavior elementary executed particular fashion. chapter enumerates detail scenarios their elements. Also, introduces threat analysis that used explore different behaviors protocols. observations are useful understanding vulnerabilities realizing requisites system design

参考文章(18)
Reza Curtmola, Baruch Awerbuch, Cristina Nita-Rotaru, Herbert Rubens, David Holmer, Mitigating Byzantine Attacks in Ad Hoc Wireless Networks ,(2004)
Yi-an Huang, Wenke Lee, Attack Analysis and Detection for Ad Hoc Routing Protocols recent advances in intrusion detection. pp. 125- 145 ,(2004) , 10.1007/978-3-540-30143-1_7
Farooq Anjum, Petros Mouchtaris, None, Security for Wireless Ad Hoc Networks ,(2007)
P. Muhlethaler, Thomas Heide Clausen, P. Jacquet, A. Qayyum, A. Laouiti, L. Viennot, Optimized Link State Routing Protocol ,(2000)
P. Brutch, C. Ko, Challenges in intrusion detection for wireless ad-hoc networks symposium on applications and the internet. pp. 368- 373 ,(2003) , 10.1109/SAINTW.2003.1210188
Shahan Yang, John S. Baras, Modeling vulnerabilities of ad hoc routing protocols Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks - SASN '03. pp. 12- 20 ,(2003) , 10.1145/986858.986861
Levente Buttyán, Jean-Pierre Hubaux, Srdan Capkun, The quest for security in mobile ad hoc networks mobile ad hoc networking and computing. pp. 146- 155 ,(2001) , 10.1145/501436.501437
H. Chris Tseng, B. Jack Culpepper, Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators Computers & Security. ,vol. 24, pp. 561- 570 ,(2005) , 10.1016/J.COSE.2005.07.001
K.D. Wong, T.-J. Kwon, V. Varina, Towards commercialization of ad hoc networks international conference on networking, sensing and control. ,vol. 2, pp. 1207- 1211 ,(2004) , 10.1109/ICNSC.2004.1297119