Secure Routing Techniques In Mobile Ad Hoc Network

Mitigating Routing Misbehaviors in Mobile Ad Hoc Networks

Authors

  • Gundeep Tanwar CMJ University Author

Keywords:

Secure Routing Techniques, Mobile Ad Hoc Network, attacks, routing layer, sophisticated attacks, detect, Wormhole attacks, Rush attacks, Watchdog, Pethrater, routing misbehaviors, secure ad hoc routing approach, localized self-healing communities

Abstract

There are numerous kinds of attacks against the routinglayer in the mobile ad hoc networks, some of which are more sophisticated andharder to detect than others, such as Wormhole attacks and Rush attacks. Inthis part, we first discuss these two kinds of sophisticated attacks and thenwe introduce Watchdog and Pethrater which are two main components in a systemthat aims to mitigate the routing misbehaviors in mobile ad hoc networks.Finally we move to a secure ad hoc routing approach using localizedself-healing communities.

Downloads

Download data is not yet available.

Downloads

Published

2012-11-01