Research on security of routing protocols against wormhole attack in the ad hoc networks

被引:0
|
作者
Hua, Huang Wen [1 ]
机构
[1] Hua, Huang Wen
来源
Hua, H.W. (hwh_xa@126.com) | 1600年 / World Scientific and Engineering Academy and Society, Ag. Ioannou Theologou 17-23, Zographou, Athens, 15773, Greece卷 / 12期
关键词
Computer crime - Internet protocols - Ad hoc networks - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
Ad hoc networks are made of a group of portable terminals with wireless transmitter as multi-hops provisional autonomy system. Ad hoc networks are very easy to be attacked by various kinds of network attacks, as the limited resources, dynamic topology and open communication channel and so on. Wormhole attack is an internal attack means against routing protocols in the Ad hoc networks-CThe research on security of routing protocols against wormhole attack in the Ad hoc networks is performed. The security routing mechanism against wormhole attack in the Ad hoc networks is put forward, on the basis of deeply research on wormhole attack principles and models. The modeling and simulations are presented in detailed.
引用
收藏
页码:255 / 264
相关论文
共 50 条
  • [1] Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks
    Azer, Marianne A.
    El-Kassas, Sherif M.
    El-Soudani, Magdy S.
    2009 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND NETWORKS COMMUNICATIONS (ICSNC 2009), 2009, : 30 - +
  • [2] Rushing Attack Against Routing Protocols in Mobile Ad-Hoc Networks
    Ghoreishi, Seyed-Mohsen
    Abd Razak, Shukor
    Isnin, Ismail Fauzi
    Chizari, Hassan
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 220 - 224
  • [3] Reactive Protocols Analysis with Wormhole Attack in Ad-hoc Networks
    Garg, Gaurav
    Kaushal, Sakshi
    Sharma, Akashdeep
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [4] Research on Routing Protocols in Ad Hoc Networks
    Niu, Dou
    Zhang, Yan
    Zhao, Yanjuan
    Yang, Mei
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND INFORMATION SYSTEMS, 2009, : 27 - 30
  • [5] Inherent security of routing protocols in ad-hoc and sensor networks
    Roosta, Tanya
    Pai, Sameer
    Chen, Phoebus
    Sastry, Shankar
    Wicker, Stephen
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 1273 - +
  • [6] The Study on Ad hoc Networks Security Strategy based on Routing Protocols
    Ma Hongwei
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 445 - 449
  • [7] Research and Simulations of Cluster Routing Protocols in Ad Hoc Networks
    Zhang Junna
    Yuan Peiyan
    Liu Ping
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 509 - +
  • [8] MANET Routing Protocols and Wormhole Attack against AODV
    Jhaveri, Rutvij H.
    Parmar, Jatin D.
    Patel, Ashish D.
    Shah, Bhavin I.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (04): : 12 - 18
  • [9] Research on Multipath Routing Protocols in Mobile Ad Hoc Networks
    Zheng Sihai
    Li Layuan
    ADVANCED TECHNOLOGY IN TEACHING - PROCEEDINGS OF THE 2009 3RD INTERNATIONAL CONFERENCE ON TEACHING AND COMPUTATIONAL SCIENCE (WTCS 2009), VOL 2: EDUCATION, PSYCHOLOGY AND COMPUTER SCIENCE, 2012, 117 : 515 - 521
  • [10] Strategies for enhancing routing security in protocols for mobile ad hoc networks
    Venkatraman, L
    Agrawal, DP
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2003, 63 (02) : 214 - 227