Secure Routing Techniques In Mobile Ad Hoc Network Mitigating Routing Misbehaviors in Mobile Ad Hoc Networks
Main Article Content
Authors
Abstract
There are numerous kinds of attacks against the routinglayer in the mobile ad hoc networks, some of which are more sophisticated andharder to detect than others, such as Wormhole attacks and Rush attacks. Inthis part, we first discuss these two kinds of sophisticated attacks and thenwe introduce Watchdog and Pethrater which are two main components in a systemthat aims to mitigate the routing misbehaviors in mobile ad hoc networks.Finally we move to a secure ad hoc routing approach using localizedself-healing communities.
Downloads
Download data is not yet available.
Article Details
Section
Articles