Research on security of routing protocols against wormhole attack in the ad hoc networks

被引:0
|
作者
Hua, Huang Wen [1 ]
机构
[1] Hua, Huang Wen
来源
Hua, H.W. (hwh_xa@126.com) | 1600年 / World Scientific and Engineering Academy and Society, Ag. Ioannou Theologou 17-23, Zographou, Athens, 15773, Greece卷 / 12期
关键词
Computer crime - Internet protocols - Ad hoc networks - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
Ad hoc networks are made of a group of portable terminals with wireless transmitter as multi-hops provisional autonomy system. Ad hoc networks are very easy to be attacked by various kinds of network attacks, as the limited resources, dynamic topology and open communication channel and so on. Wormhole attack is an internal attack means against routing protocols in the Ad hoc networks-CThe research on security of routing protocols against wormhole attack in the Ad hoc networks is performed. The security routing mechanism against wormhole attack in the Ad hoc networks is put forward, on the basis of deeply research on wormhole attack principles and models. The modeling and simulations are presented in detailed.
引用
收藏
页码:255 / 264
相关论文
共 50 条
  • [21] Wormhole Attack Detection Technique in Mobile Ad Hoc Networks
    Parvinder Kaur
    Dalveer Kaur
    Rajiv Mahajan
    Wireless Personal Communications, 2017, 97 : 2939 - 2950
  • [22] An approach to mitigate wormhole attack in wireless ad hoc networks
    Lee, Gunhee
    Kim, Dong-kyoo
    Seo, Jungtaek
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 220 - +
  • [23] Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
    Khabbazian, Majid
    Mercier, Hugues
    Bhargava, Vijay K.
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [24] Wormhole Attack Detection Technique in Mobile Ad Hoc Networks
    Kaur, Parvinder
    Kaur, Dalveer
    Mahajan, Rajiv
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 2939 - 2950
  • [25] EPSA: An efficient and privacy-preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks
    Ferrag M.A.
    Nafa M.
    Ghanemi S.
    International Journal of Security and Networks, 2016, 11 (03) : 107 - 125
  • [26] Towards the security of routing in ad hoc networks
    Uushona, N
    Penzhorn, WT
    ISIE 2005: PROCEEDINGS OF THE IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS 2005, VOLS 1- 4, 2005, : 1783 - 1788
  • [27] Routing security in wireless ad hoc networks
    Deng, HM
    Li, W
    Agrawal, DP
    IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 70 - 75
  • [28] Multipath routing protocols for mobile ad hoc networks: Security issues and performance evaluation
    Mavropodi, Rosa
    Douligeris, Christos
    AUTONOMIC COMMUNICATION, 2006, 3854 : 165 - 176
  • [29] Routing and security in mobile ad hoc networks
    Milanovic, N
    Malek, M
    Davidson, A
    Milutinovic, V
    COMPUTER, 2004, 37 (02) : 61 - +
  • [30] On security study of two distance vector routing protocols for mobile ad hoc networks
    Wang, WC
    Lu, Y
    Bhargava, B
    PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2003), 2003, : 179 - 186