Research on security of routing protocols against wormhole attack in the ad hoc networks

被引:0
|
作者
Hua, Huang Wen [1 ]
机构
[1] Hua, Huang Wen
来源
Hua, H.W. (hwh_xa@126.com) | 1600年 / World Scientific and Engineering Academy and Society, Ag. Ioannou Theologou 17-23, Zographou, Athens, 15773, Greece卷 / 12期
关键词
Computer crime - Internet protocols - Ad hoc networks - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
Ad hoc networks are made of a group of portable terminals with wireless transmitter as multi-hops provisional autonomy system. Ad hoc networks are very easy to be attacked by various kinds of network attacks, as the limited resources, dynamic topology and open communication channel and so on. Wormhole attack is an internal attack means against routing protocols in the Ad hoc networks-CThe research on security of routing protocols against wormhole attack in the Ad hoc networks is performed. The security routing mechanism against wormhole attack in the Ad hoc networks is put forward, on the basis of deeply research on wormhole attack principles and models. The modeling and simulations are presented in detailed.
引用
收藏
页码:255 / 264
相关论文
共 50 条
  • [41] Routing protocols in Mobile Ad-hoc Networks
    Mikaric, Bratislav
    Rancic, Dejan
    Ilic, Slavisa
    PRZEGLAD ELEKTROTECHNICZNY, 2020, 96 (08): : 106 - 111
  • [42] A survey of routing protocols for mobile ad hoc networks
    Ren, Jing An
    Li, Jianping
    Zhang, Min
    Jiang, Ying Hua
    Xie, Hong Tao
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 601 - +
  • [43] On the survivability of routing protocols in ad hoc wireless networks
    Awerbuch, B
    Curtmola, R
    Holmer, D
    Rubens, H
    Nita-Rotaru, C
    First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 327 - 338
  • [44] Directional routing protocols for ad-hoc networks
    Hu, B.
    Gharavi, H.
    IET COMMUNICATIONS, 2008, 2 (05) : 650 - 657
  • [45] Comparative Performance Analysis of Routing Protocols in Mobile Ad Hoc Networks under JellyFish Attack
    Wazid, Mohammad
    Kumar, Vipin
    Goudar, R. H.
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 147 - 152
  • [46] Adding Security against Packet Dropping Attack in Mobile Ad hoc Networks
    Zeshan, Muhammad
    Khan, Shoab A.
    Cheema, Ahmad Raza
    Ahmed, Attique
    2008 INTERNATIONAL SEMINAR ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, PROCEEDINGS, 2008, : 568 - 572
  • [47] Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks
    Khabbazian, Majid
    Mercier, Hugues
    Bhargava, Vijay K.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (02) : 736 - 745
  • [48] Security challenges for routing protocols in mobile ad hoc network
    Kakade, Kiran Shrimant
    Rajesh, C.
    Veena, T.
    Sivakumar, P.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (03) : 344 - 356
  • [49] The Research on AD HOC Networks Security
    Zhou Mingji
    SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 1, 2012, 114 : 895 - 902
  • [50] Defending against wormhole attacks in mobile ad hoc networks
    Wang, Weichao
    Bhargava, Bharat
    Lu, Yi
    Wu, Xiaoxin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (04): : 483 - 503