Secure Routing Techniques In Mobile Ad Hoc Network
Mitigating Routing Misbehaviors in Mobile Ad Hoc Networks
Keywords:
Secure Routing Techniques, Mobile Ad Hoc Network, attacks, routing layer, sophisticated attacks, detect, Wormhole attacks, Rush attacks, Watchdog, Pethrater, routing misbehaviors, secure ad hoc routing approach, localized self-healing communitiesAbstract
There are numerous kinds of attacks against the routinglayer in the mobile ad hoc networks, some of which are more sophisticated andharder to detect than others, such as Wormhole attacks and Rush attacks. Inthis part, we first discuss these two kinds of sophisticated attacks and thenwe introduce Watchdog and Pethrater which are two main components in a systemthat aims to mitigate the routing misbehaviors in mobile ad hoc networks.Finally we move to a secure ad hoc routing approach using localizedself-healing communities.Downloads
Download data is not yet available.
Published
2012-11-01
Issue
Section
Articles