Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(133.91KB)
This is an Open Access publication published under CSC-OpenAccess Policy.

PUBLICATIONS BY COUNTRIES

Top researchers from over 74 countries worldwide have trusted us because of quality publications.

United States of America
United Kingdom
Canada
Australia
Malaysia
China
Japan
Saudi Arabia
Egypt
India
A Review of Current Routing Attacks in Mobile Ad Hoc Networks
Rashid Hafeez Khokhar, Md Asri Ngadi, Satria Mandala
Pages - 18 - 29     |    Revised - 04-08-2008     |    Published - 16-09-2008
Volume - 2   Issue - 3    |    Publication Date - June 2008  Table of Contents
MORE INFORMATION
KEYWORDS
MANET security, Routing protocols, Cryptography, Communications and data security, Shared wireless channel
ABSTRACT
A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. Different mechanisms have been proposed using various cryptographic techniques to countermeasure the routing attacks against MANET. However, these mechanisms are not suitable for MANET resource constraints, i.e., limited bandwidth and battery power, because they introduce heavy traffic load to exchange and verifying keys. In this paper, the current security issues in MANET are investigated. Particularly, we have examined different routing attacks, such as flooding, blackhole, link spoofing, wormhole, and colluding misrelay attacks, as well as existing solutions to protect MANET protocols.
CITED BY (109)  
1 Jung, S., & Kumar, R. (2016). Security of Routing Protocols in MANETs: A Survey. Global Sci-Tech, 8(1), 22-36.
2 Khanna, N. (2016). Mitigation of Collaborative Blackhole Attack using TRACEROUTE Mechanism with Enhancement in AODV Routing Protocol.
3 Sardana, A., Saini, A., Bedwal, T., & Tayal, R. (2015, March). Black hole attack's effect mobile ad-hoc networks (MANET). In Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in (pp. 966-970). IEEE.
4 Rajkumar, B., & Narsimha, G. (2015). Trust-based light weight authentication routing protocol for MANET. International Journal of Mobile Network Design and Innovation, 6(1), 31-39.
5 Singh, N., & Shrivastava, L. (2015). Impact of Antenna model with the variation of speed for Reactive and Hybrid routing protocols in Mobile Ad-Hoc Networks.
6 Schoofs, M. HIV VULNERABILITY FOUND via STOCK MARKET ANALYSIS.
7 Lakshmi, A. A., & Valluvan, K. R. (2015). Support vector machine and fuzzy-based intrusion detection and prevention for attacks in MANETs. International Journal of Mobile Network Design and Innovation, 6(2), 63-72.
8 Ramana, V. V., & Reddy, A. R. M. (2015). Secure routing in MANETs: a bio–inspired approach with honey bees. International Journal of Wireless and Mobile Computing, 8(1), 82-89.
9 Patidar, B., & Shivhare, R. R. (2015). Detection of Wormhole Attack using Round Trip Time and Node Workload. International Journal of Computer Applications, 112(11).
10 Kapur, R. K., & Khatri, S. K. (2015, March). Analysis of attacks on routing protocols in MANETs. In Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in (pp. 791-798). IEEE.
11 Aggarwal, A., Gandhi, S., Chaubey, N., Tada, N., & Trivedi, S. (2014). NDTAODV: Neighbor Defense Technique for Ad Hoc On-Demand Distance Vector (AODV) to mitigate flood attack in MANETS. arXiv preprint arXiv:1405.6216.
12 Enshaei, M., Hanapi, Z. M., & Othman, M. (2014). Vulnerability and Routing Protocols.
13 Barkouzos, T. (2014). Security in Ad Hoc networks.
14 Hassan, A., & Radenkovic, M. (2014, August). Simulation of security attacks and preventions on AODV protocol in ns-3. In Innovative Computing Technology (INTECH), 2014 Fourth International Conference on (pp. 158-163). IEEE.
15 Hassan, A., Ahsan, S., Alshomrani, S., & Alshamrani, A. (2014). Packet Travel Time based Mechanism for Detection and Mitigation against Wormhole Attack in AODV for MANETs. Life Science Journal, 11(10s).
16 Enshaei, M., Hanapi, Z. M., & Othman, M. (2014). A review: Mobile Ad Hoc Networks challenges, attacks, security, vulnerability and routing protocols. International Journal on Communications Antenna and Propagation (IRECAP), 4(5), 168-179.
17 Rajamohamed, R., & Rajamani, V. (2014). A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for MANETs. Journal of Convergence Information Technology, 9(6), 210.
18 BAKILER, H. IMPROVEMENT OF PERFORMANCE AND CAPACITIES OF WIRELESS AD HOC NETWORKS.
19 Sharma, R., & Singla, B. Comparison of AOMDV With and Without Black Hole Attack.
20 Sharma, R., & Singla, B. An Introduction to MANETS.
21 Pradeep, P. V., & Harika, C. (2014). Detecting Adversary Location in Mobile Sensor Networks. International Journal of Research, 1(11), 1011-1022.
22 Hatzivasilis, G., Papaefstathiou, I., & Manifavas, C. (2014, November). ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks. In Computer Systems and Applications (AICCSA), 2014 IEEE/ACS 11th International Conference on (pp. 56-63). IEEE.
23 Gupta, A., & Gupta, A. K. (2014). A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks. Global Journal of Computer Science and Technology, 14(1-E), 23.
24 Tan, S., Sok, P., & Kim, K. (2014). Using Cryptographic Technique for Securing Route Discovery and Data Transmission from BlackHole Attack on AODV-based MANET. International Journal of Networked and Distributed Computing, 2(2), 100-107.
25 Panda, P., Gadnayak, K. K., & Panda, N. (2013). MANET Attacks and their Countermeasures: A Survey.
26 Gandhi, R., & Joeg, P. LERP: A Secure Location Based Efficient Routing Protocol.
27 Ghani, I., Hakemi, A., Jeong, S. R., & Sanaei, M. G. P. (2013). ROUTING ATTACKS IN MOBILE AD HOC NETWORKS: AN OVERVIEW. Science International, 25(4).
28 Abdul Jawad, P. P., & Chacko, B. ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS.
29 Arora, K., & Jindal, S. ANALYTICAL REVIEW OF AODV IN WORM HOLE ATTACK.
30 Arunachalam, V. P., & Ravichandran, T. A Novel Direction Ratio Sampling Algorithm (DRSA) Approach for Multi Directional Geographical Traceback. International Journal of Computer Science and Security (IJCSS), 3(4), 272.
31 Sudhakar Sengan, D. S. (2013). A Trust and Co-Operative Nodes with Affects of Malicious Attacks and Measure the Performance Degradation on Geographic Aided Routing in Mobile Ad Hoc Network. Life Science Journal, 10(4s).
32 Sanaei, M. G., Ghani, I., Hakemi, A., & Jeong, S. R. (2013). ROUTING ATTACKS IN MOBILE AD HOC NETWORKS: AN OVERVIEW. Science International, 25(4).
33 Callegari, C., Giordano, S., Mannella, S., & Pagano, M. (2013). Design and Implementation of a Testbed for the Security Assessment of MANETs. In Cyberspace Safety and Security (pp. 228-242). Springer International Publishing.
34 Sinnreich, A., Graham, N., & Trammell, A. MONDO NET.
35 Seethalakshmi, S., & Manikandan, K. C. (2013). Comparison of Different Methods to identify wormhole attacks in MANETS. International Journal of Advanced Networking and Applications, 4(5), 1760.
36 Bhuvaneshwari, K., & Devaraj, A. F. S. (2013). Examination of Impact of Flooding attack on MANET and to accentuate on Performance Degradation. International Journal of Advanced Networking and Applications, 4(4), 1695.
37 SAI PRAGATHI, Y. V. S., & Setty, S. P. (2013). HYBRID ANONYMOUS LOCATION-AIDED ROUTING PROTOCOL FOR PRIVACY PRESERVING AND AUTHENTICATION IN MANET. Journal of Theoretical & Applied Information Technology, 55(2).
38 Lekova, A., & Adda, M. (2013). Reliable OLSR in MANETs for detecting and isolating user selfish nodes. Complex Control Systems, 11, 1-9.
39 Ahmed, S., & Nirkhi, S. M. (2013). Fuzzy Forensic Analysis System for DDoS Attack in MANET Response Analysis. simulation, 639(156), 343.
40 Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of Impact of Wormhole Attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652.
41 Vandana, C. P., & Devaraj, A. F. S. (2013). Evaluation of Impact of Wormhole Attack on AODV. International Journal of Advanced Networking and Applications, 4(4), 1652.
42 Khandelwal, V., & Goyal, D. (2013). BlackHole Attack and Detection Method for AODV Routing Protocol in MANETs. IJARCET, 2(4), 1555-9.
43 Bhosle, A. A., Thosar, T. P., & Mehatre, S. (2012). Black-hole and wormhole attack in routing protocol AODV in MANET. International Journal of Computer Science, Engineering and Applications, 2(1), 45.
44 Woungang, I., Dhurandher, S. K., Peddi, R. D., & Obaidat, M. S. (2012, May). Detecting blackhole attacks on DSR-based mobile ad hoc networks. In Computer, Information and Telecommunication Systems (CITS), 2012 International Conference on (pp. 1-5). IEEE.
45 Ramana, V. V., Reddy, A., & Sekaran, K. C. (2012). Bio Inspired Approach to Secure Routing in MANETs. arXiv preprint arXiv:1208.3486.
46 Choudhury, P., Nandi, S., Pal, A., & Debnath, N. C. (2012, July). Mitigating route request flooding attack in MANET using node reputation. In Industrial Informatics (INDIN), 2012 10th IEEE International Conference on (pp. 1010-1015). IEEE.
47 Pavani, K., & Avula, D. (2012). Performance of Mobile Adhoc Networks in Presence of Attacks. International Proceedings of Computer Science and Information Technology, 56, 147.
48 Kumar, A. V., Jeyapal, A., & Gowda, R. (2012). FPGA implementation of enhanced ABR protocol with auto defense towards malicious node in MANETs. Internal Security, 4(2), 139.
49 Priyadarsini, S. (2012). TSRD-RL algorithm based Secured Route Discovery for MANET with improved Route Lifetime. International Journal of Electronics and Electrical Engineering, 1(1), 52-67.
50 Saha, H. N., Bhattacharyya, D., & Banerjee, P. K. (2012). Energy efficient administrator based secure routing in MANET. In Advances in Computer Science, Engineering & Applications (pp. 659-672). Springer Berlin Heidelberg.
51 Dadhania, P., & Patel, S. (2012). Comparative performance analysis of AODV and DSR routing protocols in MANET.
52 Vinod, B. (2012). Responding to an Attack in Sensor Networks (Doctoral dissertation, Oklahoma State University).
53 Munjal, K., Verma, S., & Bakshi, A. (2012). Cooperative black hole node detection by modifying AODV. Int. J. Manag. IT Eng.(IJMIE), 2, 484-501.
54 Min, S. G., Park, Y. H., Park, Y. H., & Moon, S. J. (2012). Secure routing protocol in cluster-based ad hoc networks. The Journal of Korean Institute of Communications and Information Sciences, 37(12), 1256-1262.
55 Sathya, R., & Latha, P. (2012). An Effective Security Approach for MANET using Detection Algorithm. Wireless Communication, 4(12), 702-707.
56 Pal, A., & Choudhury, P. (2012). Mitigating Black Hole Attacks in AODV Routing Protocol Using Dynamic Graph. Mapana-Journal of Sciences, 11(4), 65-76.
57 Saha, H. N., Bhattacharyya, D., & Banerjee, P. K. (2012). A Novel Energy Efficient and Administrator Based Secured Routing in MANET. International Journal of Network Security & Its Applications, 4(4), 73.
58 Sathiyakumar, C., & Duraiswamy, K. (2012). A Secured Key Model for Efficient Node Clustering Based on Reputation and Ranking Model. European Journal of Scientific Research, 74(3), 433-439.
59 KALOKI, M. P. (2012). SCHOOL OF COMPUTING AND INFORMATICS MASTERS DEGREE OF SCIENCE IN COMPUTER SCIENCE (Doctoral dissertation, The University of Nairobi).
60 Minseonggeun , bakyohan , Young Ho Park , & Cryptology . (2012) . Cluster -based security in an ad hoc routing protocol in a network environment.The Journal of Korea Information and Communications Society , 37 ( 12), 1256-1262.
61 Shendurkar, M. A. M., Chopde, N. R., & Chopde, N. R. Nav view search.
62 Vuppala, S., Banerjee, A., Pal, A., & Choudhury, P. (2011). An Attack Identification Scheme Using Hierarchical Data Clustering in MANET. In International Conference on Computer Engineering and Technology, 3rd (ICCET 2011). ASME Press.
63 Sravani, B. S., Jagadeepak, T., Devi, B. R., & Rao, B. P. Examining the performance of AODV routing protocol under black hole attack with varied node densities and mobilities.
64 SHARMA, K., & SINGLA, P. A SURVEY ON VARIOUS SECURITY ATTACKS IN MANET.
65 Saha, H. N., Bhattacharyya, D., & Banerjee, P. K. (2011). Minimized Overhead and Administrator based Secure Routing Protocol. International Journal of Computer Applications, 25(9).
66 Anwar, Y. (2011). spectre footnotes. SURVIVAL, 6, 10.
67 Pal, K., & Bansal, D. (2011). Simulation Analysis of Secure OLSR Routing Protocol. Networking and Communication Engineering, 3(8), 532-537.
68 Saha, H. N., Bhattacharyya, D., & Banerjee, P. K. (2011). A novel and Efficient Secured Routing Algorithm in Mobile Ad hoc Network. International Journal of Wireless & Mobile Networks, 3(5), 245.
69 Pal, K., Sofat, S., & Bansal, D. (2011). Comparison of Secure OLSR Routing Protocol. International Journal of Engineering Science and Technology, 3(6).
70 Peddi, R. D. Preventing Collaborative Blackhole Attacks on Mobile Ad Hoc Networks.
71 RAGHU, R., & SARAVANAN, V. Classification of routing Protocol.
72 Paramasiven, A. (2011). Rendering Wormhole Attacks Trivial using the Scalability Features of a Geocasting Protocol. International Journal of Computer Applications, 19(5), 24-28.
73 Guptha, A. S., & Reshma, S. Minimizing Routing Attacks in MANET Using Extended Dempster-Shefer Theory.
74 SATHEESH, N., & PRASADH, K. (2014). TRUST BASED AD HOC ON DEMAND DISTANCE VECTOR ROUTING PROTOCOL AGAINST WORMHOLE ATTACK. Journal of Theoretical and Applied Information Technology, 70(3).
75 Magardey, A., & Arjariya, T. Secure Detection and Prevention Scheme for Jamming Attack in MANET.
76 Seyyedtaj, M., & Jamali, M. A. J. Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network. International Journal of Computer Applications Technology and Research, 3(9), 541-546.
77 Singamsetty, R. S. (2011). Detection of malicious nodes in mobile ad hoc networks (Doctoral dissertation, University of Toledo).
78 Sahni, V., Thapar, V., & Jain, B. (2011). Security Implications of Ad-hoc Routing Protocols against Wormhole Attack using Random Waypoint Mobility Model in Wireless Sensor Network. International Journal of Computer Science and Information Security, 9(11), 138.
79 Saha, H. N., Bhattacharyya, D., & Banerjee, P. K. (2011). Fidelity Index Based on Demand (FBOD) Secure Routing in Mobile Ad Hoc Network. In Advances in Parallel Distributed Computing (pp. 615-627). Springer Berlin Heidelberg.
80 Sinnreich, A., Graham, N., & Trammell, A. (2011). Weaving a new'Net: A mesh-based solution for democratizing networked communications. The Information Society, 27(5), 336-345.
81 Tamilarasan, S., & Reddy, M. S. (2011). A Quantitative Study and Comparison of Secure OLSR Routing Protocol. S Tamilarasan et al, Int. J. Computer Technology & Applications, 3(2), 632-638.
82 Mohammadi, S., & Jadidoleslamy, H. (2011). A Comparison of Transport and Application Layers Attacks on Wireless Sensor Networks. organization, 4, 21.
83 Jebadurai, I. J. R., & Rajsingh, E. B. (2011). A Survey on Sinkhole attack Detection methods in Mobile Ad-hoc Networks. In 3rd International Conference on Mechine Learning and Computing (Vol. 4).
84 Jebadurai, J. V. S., Melvin, A. A. R., & Jebadurai, I. J. R. (2011, April). Sinkhole detection in mobile ad-hoc networks using mutual understanding among nodes. In Electronics Computer Technology (ICECT), 2011 3rd International Conference on (Vol. 3, pp. 321-324). IEEE.
85 Mohammadi, S., Atani, R. E., & Jadidoleslamy, H. (2011). A Comparison of Routing Attacks on Wireless Sensor Networks. organization, 4, 21.
86 Mohammadi, S., & Jadidoleslamy, H. (2011). A comparison of physical attacks on wireless sensor networks. International Journal of Peer to Peer Networks, 2(2), 24-42.
87 Mohammadi, S., & Jadidoleslamy, H. (2011). A comparison of link layer attacks on wireless sensor networks. arXiv preprint arXiv:1103.5589.
88 Maulik, R., & Chaki, N. (2011). A study on wormhole attacks in MANET. International Journal of Computer Information Systems and Industrial Management Applications ISSN, 2150-7988.
89 Basuray, C., Giri, D., Chatterjee, S., & Ganguly, S. Minimized Overhead and Administrator based Secured Routing Protocol.
90 Sinnreich, A. Weaving a New ‘Net: A Mesh-Based Solution for Democratizing Networked Communications Aram Sinnreich, Nathan Graham, and Aaron Trammell Rutgers University.
91 Babu, M. R., & Selvan, S. A Reliable Attack-Resistant Authenticated Routing Protocol for Mobile Adhoc Networks.
92 VAGHELA, M. R. D., & GOSWAMI, N. J. A MODIFIED HYBRID PROTOCOL (ZRP) USED FOR DETECTION AND REMOVAL OF BLACK HOLE NODE IN MANET.
93 Biswas, M., Jana, A., Paul, R., & Saha, H. N. A Secure Routing Protocol Based On Fidelity.
94 GODE, M. N. R. INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY.
95 SARAVANAN, V., & RAGHU, R. A survey on Different Security Attacks in MANET.
96 Gosavi, M., & Jayanthi, E. A Survey on Different Available Detection Techniques of IDS and Attacks at Different Layers of MANET.
97 Raja, R., Sharmili, M., & Scholar, P. G. ENHANCED CO-OPERATIVE BAIT DETECTION SCHEME FOR DOS IN MANET’s.
98 Meyer, D. TOWARDS a SATELLITE COMMONS.
99 JAIN, S., & GUPTA, H. Detection and Prevention of Flooding in MANET Using Behavioral Rating.
100 Pavani, K., & Avula, D. Injection of Attacks in MANETs. IOSR Journal of Computer Engineering (IOSRJCE), ISSN, 2278-0661.
101 Shendurkar, M. A. M., & Chopde, N. R. A Review of Black Hole and Worm Hole Attack on AODV Routing Protocol in MANET. International Journal of Engineering Trends and Technology (IJETT)–Volume, 9, 394-399.
102 Tapaswi, S., & Kushwah, V. S. (2010, June). Securing Nodes in MANETs Using Node Based Key Management Scheme. In Advances in Computer Engineering (ACE), 2010 International Conference on (pp. 228-231). IEEE.
103 He, F., Hao, K., & Ma, H. (2010, July). S-MAODV: A trust key computing based secure Multicast Ad-hoc On Demand Vector routing protocol. In Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on (Vol. 6, pp. 434-438). IEEE.
104 Mamatha, G. S., & Sharma, S. C. (2010). A robust approach to detect and prevent network layer attacks in MANETS. International Journal of Computer Science and Security, 4(3), 275-284.
105 Jhaveri, R. H., Patel, A. D., Parmar, J. D., & Shah, B. I. (2010). MANET routing protocols and wormhole attack against AODV. International Journal of Computer Science and Network Security, 10(4), 12-18.
106 Shanthi, K., & Murugan, D. Pair-wise key agreement and hop-by-hop authentication protocol for MANET. Wireless Networks, 1-9.
107 Nath, R., & Sehgal, P. K. (2009). A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network.
108 Karthik, S., Arunachalam, V. P., & Ravichandran, T. (2009). A novel Direction ratio sampling algorithm (DRSA) approach for multi directional geographical traceback.
109 Sehgal, P. K., & Nath, R. (2009). A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network. International Journal of Computer Science and Security (IJCSS), 3(1), 16.
1 Google Scholar 
2 Academic Journals Database 
3 ScientificCommons 
4 Academic Index 
5 CiteSeerX 
6 refSeek 
7 iSEEK 
8 Socol@r  
9 ResearchGATE 
10 Libsearch 
11 Bielefeld Academic Search Engine (BASE) 
12 Scribd 
13 WorldCat 
14 SlideShare 
15 PDFCAST 
16 PdfSR 
1 L. R. Ford Jr. and D. R. Fulkerson, Flows in Networks, Princeton Univ. Press, 1962.
2 Th. Clausen et al., “Optimized Link State Routing Protocol,” IETF Internet draft, ietfmanet-11.txt, July 2003
3 C.-C. Chiang, "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel," Proc. /E€€ SlCON '97, Apr. 1997, pp. 197-21 1.
4 S. Desilva, and R. V. Boppana, “Mitigating Malicious Control Packet Floods in Ad Hoc Networks,” Proc. IEEE Wireless Commun. and Networking Conf., New Orleans, LA, 2005.
5 C. R. Dow, P. J. Lin, S. C. Chen*, J. H. Lin*, and S. F. Hwang. A Study of Recent Research Trends and Experimental Guidelines in Mobile. Ad-hoc Networks. 19th International Conference on Advanced Information Networking and Applications, 2005. AINA 2005, Volume: 1, On page(s): 72- 77 vol.1.
6 B. Kannhavong et al., “A Collusion Attack Against OLSR-Based Mobile Ad Hoc Networks,” IEEE GLOBECOM ’06.
7 B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour. A survey of routing attacks in mobile ad hoc networks. Security in wireless mobile ad hoc and sensor networks, October 2007, page, 85-91
8 S. Kurosawa et al., “Detecting Blackhole Attack on AODV-Based Mobile Ad Hoc Networks by Dynamic Learning Method,” Proc. Int’l. J. Network Sec., 2006.
9 Z. Karakehayov, “Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks,” Wksp. Real-World Wireless Sensor Networks, June 20–21, 2005.
10 Jyoti Raju and J.J. Garcia-Luna-Aceves, “ A comparison of On-Demand and Table-Driven Routing for Ad Hoc Wireless etworks’,” in Proceeding of IEEE ICC, June 2000.
11 D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, T. Imielinski and H. Korth, Ed., pp. 153-81. Kluwer, 1996.
12 IEEE Std. 802.11, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,” 1997.
13 Y-C. Hu, A. Perrig, and D. Johnson, “Wormhole Attacks in Wireless Networks,” IEEE JSAC, vol. 24, no. 2, Feb. 2006.
14 S. Lee, B. Han, and M. Shin, “Robust Routing in Wireless Ad Hoc Networks,” 2002 Int’l. Conf. Parallel Processing Wksps., Vancouver, Canada, Aug. 18–21, 2002.
15 S. Marti et al., “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” 6th MobiCom, Boston, MA, Aug. 2000.
16 V. D. Park and M. S. Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks," Proc. lNFOCOM '97, Apr. 1997.
17 C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," Comp. Com- mun. Rev., Oct. 1994, pp. 234-44.
18 C. Perkins and E Royer, “Ad Hoc On-Demand Distance Vector Routing,” 2nd IEEE Wksp. Mobile Comp. Sys. and Apps., 1999.
19 C. Perkins, E. Belding-Royer, and S. Das, “Ad Hoc On demand Distance Vector (AODV) Routing,” IETF RFC 3561, July 2003.
20 L. Qian, N. Song, and X. Li, “Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks Through Statistical Analysis of Multi-path,” IEEE Wireless Commun. and Networking Conf. ’05.
21 D. Raffo et al., “Securing OLSR Using Node Locations,” Proc. 2005 Euro. Wireless, Nicosia, Cyprus, Apr. 10–13, 2005.
22 K. Sanzgiri et al., “A Secure Routing Protocol for Ad Hoc Networks,” Proc. 2002 IEEE Int’l. Conf. Network Protocols, Nov. 2002.
23 C.K.Toh, “Ad Hoc Mobile Wireless Networks: Protocols and Systems,” Prentice Hall Publications, 2002.
24 P. Yi et al., “A New Routing Attack in Mobile Ad Hoc Networks,” Int’l. J. Info. Tech., vol. 11, no. 2, 2005.
25 M. G. Zapata and N. Asokan, “Securing Ad-Hoc Routing Protocols,” Proc. 2002 ACM Wksp. Wireless Sec., Sept. 2002, pp. 1–10.
Dr. Rashid Hafeez Khokhar
Universiti Teknologi Malaysia (UTM) - Malaysia
rkhokhar@gmail.com
Dr. Md Asri Ngadi
Department of Computer System & Communication Universiti Teknologi Malaysia (UTM) - Malaysia
Mr. Satria Mandala
Faculty Department of Computer System & Communication Universiti Teknologi Malaysia (UTM) - Malaysia