International Business Management

Year: 2011
Volume: 5
Issue: 3
Page No. 178 - 183

A Study of Attacks, Attack Detection and Prevention Methods in Proactive and Reactive Routing Protocols

Authors : S. Kannan, T. Maragatham, S. Karthik and V.P. Arunachalam

References

Al-Shurman, M., S.M. Yoo and S. Park, 2004. Black hole attack in mobile Ad Hoc networks. Proceedings of the 42nd Annual Southeast Regional Conference, April 2-3, 2004, Huntsville, AL. USA., pp: 96-97.

Anjum, F., S. Das, P. Gopalakrishnan, L. Kant and B. Kim, 2005. Security in an insecure WLAN network. Proceedings of the International Conference on Wireless Networks, Communications and Mobile Computing, June 13-16, USA., pp: 292-297.

Chiang, C.C., H.K. Wu, W. Liu and M. Gerla, 1997. Routing in clustered multihop, mobile wireless networks with fading channel. Proceedings of the IEEE SICON Conference, April 1997, USA., pp: 197-211.

Clausen, T. and P. Jacquet, 2003. Optimized link state routing protocol. Internet Draft, IETF Manet Working Group. http://tools.ietf.org/html/draft-ietf-manet-olsr-11.

Desilva, S. and R.V. Boppana, 2005. Mitigating malicious control packet floods in Ad Hoc networks. Proceedings of the IEEE Wireless Communications and Networking Conference, March 13-17, New Orleans, LA. USA., pp: 2112-2117.

Dow, C.R., P.J. Lin, S.C. Chen, J.H. Lin and S.F. Hwang, 2005. A study of recent research trends and experimental guidelines in mobile Ad-Hoc networks. Proceedings of the 19th International Conference on Advanced Information Networking and Applications, March 28-30, Taichung, Taiwan, pp: 72-77.

Ford, L.R. and D.L. Fulkerson, 1962. Flows in Networks. Princeton University Press, New Jersey, USA., ISBN-10: 0691079625, pp:198.

Hu, Y.C., A. Perrig and D.B. Johnson, 2006. Wormhole attacks in wireless networks. IEEE J. Selected Areas Commun., 24: 370-380.
CrossRef  |  

IEEE 802.11, 1997. IEEE standard for wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. Institute of Electrical and Electronics Engineers, pp: 456. http://www.techstreet.com/cgi-bin/detail?doc_no=IEEE%7C802_11_1997&product_id=36494.

Johnson, D.B. and D.A. Maltz, 1996. Dynamic Source Routing in Ad Hoc Wireless Networks. In: Mobile Computing, Imielinski, T. and H.F. Korth (Eds.). Chapter 5, Kluwer Academic Publishers, Norwell, MA., USA., ISBN-13: 9780792396970, pp: 153-181.

Kannhavong, B., H. Nakayama and A. Jamalipour, 2006. NIS01-2: A collusion attack against olsr-based mobile Ad Hoc networks. Proceedings of the Global Telecommunications Conference, Nov. 27-Dec. 1, San Francisco, CA. USA., pp: 1-5.

Kannhavong, B., H. Nakayama, Y. Nemoto, N. Kato and A. Jamalipour, 2007. A survey of routing attacks in mobile Ad Hoc networks. IEEE Wireless Commun., 14: 85-91.
CrossRef  |  

Karakehayov, Z., 2005. Using REWARD to detect team black-hole attacks in wireless sensor networks. Proceedings of the Workshop on Real-World Wireless Sensor Etworks, June 20-21, Stockholm, Sweden, pp: 1-5.

Kurosawa, S., H. Nakayama, N. Kato, A. Jamalipour and Y. Nemoto, 2007. Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method. Int. J. Network Security, 5: 338-346.
Direct Link  |  

Lee, S., B. Han and M. Shin, 2002. Robust routing in wireless Ad Hoc networks. Proceedings of the International Conference on Parallel Processing Workshops, August 18-21, 2002, Vancouver, Canada, pp: 73-78.

Marti, S., T.J. Giuli, K. Lai and M. Baker, 2000. Mitigating routing misbehavior in mobile ad hoc networks. Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, August 6-11, 2000, Boston, MA., USA., pp: 255-265.

Park, V.D. and M.S. Corson, 1997. A highly adaptive distributed routing algorithm for mobile wireless networks. Proceedings of the 6th Annual Joint Conference on Computer and Communications Societies, April 7-12, 1997, Kobe, Japan, pp: 1405-1413.

Perkins, C.E. and P. Bhagwat, 1994. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers. Proceedings of the Conference on Communications Architectures, Protocols and Applications, August 31-September 2, 1994, England, UK., pp: 234-244.

Potlapally, N.R., S. Ravi, A. Raghunathan and N.K. Jha, 2006. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mobile Comput., 5: 128-143.
CrossRef  |  

Raju, J. and J.J. Garcia-Luna-Aceves, 2000. A comparison of on-demand and table-driven routing for Ad Hoc wireless networks. Proceedings of the IEEE International Conference on Communications, June 2000, USA., pp: 1702-1706.

Yang, H., F. Ricciato, S. Lu and L. Zhang, 2006. Securing a wireless world. IEEE Proc., 94: 442-454.
CrossRef  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved