Secure Multicast Routing Protocol against Insider Attacks in MANET
Abstract
Keywords
Full Text:
PDFReferences
V.Jayalakshmi, R.Rameshkumar and S. Geetha,‖ Secure Multi cast Routing Protocol against Black Hole Attacks in MANET‖, Proceedings in CiiT,First International Conference on Adavances in Engineering and Technology,(IACET-2011),May 27-28,2011
Y.B. Ko and N.H. Vaidya, ―Flooding-Based Geocasting Protocols for Mobile Ad Hoc Networks,‖ Mobile Networks and Applications, vol. 7, no. 6, 2002.
R. Chandra, V. Ramasubramanian, and K. Birman, ―Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks,‖ Proc. 21st Int’l Conf. Distributed Computing Systems (ICDCS ’01), 2001.
Y.-B. Ko and N.H. Vaidya, ―GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks,‖ Proc. Eighth Ann. Int’l Conf. Network Protocols (ICNP ’00), p. 240, 2000.
E.L. Madruga and J.J. Garcia-Luna-Aceves, ―Scalable Multicasting: The Core-Assisted Mesh Protocol,‖ Mobile Networks and Applications, vol. 6, no. 2, 2001.
S.J. Lee, W. Su, and M. Gerla, ―On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks,‖ Mobile Networks and Applications, vol. 7, 2002.
E. Royer and C. Perkins, Multicast Ad-Hoc On-Demand Distance Vector (MAODV) Routing, Internet draft, July 2000.
J.G. Jetcheva and D.B. Johnson, ―Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Networks,‖
P. Papadimitratos and Z. Haas, ―Secure Routing for Mobile Ad Hoc Networks,‖ Proc. Comm. Networks and Distributed Systems Modeling and Simulation Conf. (CNDS ’02), pp. 27-31, Jan. 2002.
Y.-C. Hu, D.B. Johnson, and A. Perrig, ―SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,‖ Proc. Fourth IEEE Workshop Mobile Computing Systems and Applications (WMCSA ’02), June 2002.
Y.-C. Hu, A. Perrig, and D.B. Johnson, ―Ariadne: A Secure On- Demand Routing Protocol for Ad Hoc Networks,‖ Proc. ACM MobiCom, Sept. 2002.
K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, and E. Belding- Royer, ―A Secure Routing Protocol for Ad Hoc Networks,‖ Proc. 10th Ann. Int’l Conf. Network Protocols (ICNP ’02), Nov. 2002.
S. Marti, T. Giuli, K. Lai, and M. Baker, ―Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,‖ Proc. ACM MobiCom, Aug. 2000.
P. Papadimitratos and Z. Haas, ―Secure Data Transmission in Mobile Ad Hoc Networks,‖ Proc. ACM Workshop Wireless Security (WiSe ’03), pp. 41-50, 2003.
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, ―An On- Demand Secure Routing Protocol Resilient to Byzantine Failures,‖ Proc. ACM Workshop Wireless Security (WiSe ’02), 2002
S. Roy, V.G. Addada, S. Setia, and S. Jajodia, ―Securing MAODV: Attacks and Countermeasures,‖ Proc. Second Ann. IEEE Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON), 2005.
The Network Simulator—ns2, http://www.isi.edu/nsnam/ns/, 2008.
A. Perrig, R. Canetti, D. Song, and J. D. Tygar, ―Efficient and secure source authentication for multicast,‖ in Proc. of NDSS’01, 2001.
S. Roy, V. G. Addada, S. Setia, and S. Jajodia, ―Securing MAODV: Attacks and countermeasures,‖ in Proc. of SECON ’05. IEEE, 2005
J.-P. Hubaux, L. Buttyan, and S. Capkun, ―The quest for security in mobile ad hoc networks,‖ in Proc. of MobiHoc ’01, October 2001.
R. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh, ―Bootstrapping security associations for routing in mobile ad-hoc networks,‖ in Global Telecommunications Conference (GLOBECOM), 2003.
L. Zhou and Z. Haas, ―Securing ad hoc networks,‖ IEEE Network Magazine, vol. 13, no. 6, 1999.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.