A Survey of Network Layer attacks and Security Mechanisms and Solutions for Routing Protocols in MANET
Abstract
Keywords
Full Text:
PDFReferences
M. Abolhasan, T. Wysocki and E. Dutkiewicz: A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, (1).2: p. 1-22 (2004).
C. E. Perkins and P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing (DSDV) for Mobile Computers, SIGCOMM’94 Conf.on Communications Architectures, Protocols and Applications,Aug. 1994, pp. 234-244.
T.H. Clausen, G. Hansen, L.Christensen, and G.Behrmann, The optimized link state protocol, Evaluation through Experiments and Simulation, Proc. Of IEEE Symp. On Wireless Personal Mobile Communications 2001, Sep. 2001.
C. E. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (AODV) routing,” Experimental RFC 3561,Internet Engineering Task Force (IETF), July 2003.
D. Johnson, Y. Hu, and D. Maltz, “The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4,”Experimental RFC 4728, Internet Engineering Task Force (IETF), February 2007.
Z. J. Hass, M.R. Pearlman and P.Samar: “The zone routing protocol (ZRP) for ad hoc networks," IETF MANET Working Group, (2002).
W. Stallings, Cryptography and Network Security: Principles and Practices, 3rd edition, Prentice Hall, 2003
S. Burnett and S. Paine, RSA Security’s Official Guide to Cryptography, RSA Press, 2001.
F. Nait- Abdesselam, B.Bensaou, and T. Taleb. “Detecting and avoiding wormhole attack in wireless ad hoc networks “, IEEE Communication Magaz, Vol 46, no. 4, pp.127-33, Apr. 2003.
J. Newsome, E. Shi, D. Song, and A. Perrig, The sybil attack in sensor networks: analysis &defences, Proc. of the 3rd Intl. Symp. On Information Processing in Sensor Networks, 2004.
J. Barkley, NIST Special Publication: Symmetric Key Cryptography,http://csrc.nist.gov/publications/nistpubs/800-7/node208. html
R. Kravets, S. Yi, and P. Naldurg, Security-aware routing protocol for wireless Ad hoc Networks, In ACM Symp. on Mobile Ad Hoc Networking and Computing, 2001.
Y. C. Hu, D. B. Johnson and A. Perrig, SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks, Fourth IEEE Workshop on Mobile Computing Systems and Applications (WM-CSA’02), Jun. 2002.
K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, A Secure Routing Protocol for Ad Hoc Networks. Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 78-87, 2002
P. Papadimitratos and Z. J. Haas, “Secure routing for mobilead hoc Networks,” Proc. Communication Networks and Distributed Systems, Modelling and Simulation Conf. (CNDS’02),San Antonio, Texas, Jan. 2002, pp. 27–31.
Zubair Muhammad Fadlullah, Tarik Taleb, and Marcus Schöller, “Combating against Security Attacks against Mobile Ad Hoc Networks (MANETs)”.
Y. -C. Hu, D. B. Johnson, and A. Perrig, Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Mobicom’02, 2002
A. Perrig, R. Canetti, D. Tygar, and D. Song, the TESLA broadcast authentication protocol, RSA Cryptobytes (RSA Laboratories), Vol 5, No 2, Summer/Fall 2002, pp. 2-13.
S. Buchegger and J. L. Boudec, Performance Analysis of the CONFIDANT Protocol Cooperation Of Nodes Fairness In Dynamic Ad-hoc Networks, In Proc. of IEEE/ACM Symposium on Mobile Ad Hoc Net-working and Computing (MobiHOC), Jun. 2002.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.