Attacks and Defenses of Routing Mechanisms in Ad Hoc and Sensor Networks

نویسندگان

  • You-Chiun Wang
  • Yu-Chee Tseng
چکیده

An ad hoc or a sensor network is composed of a collection of wireless nodes. A node can only communicate with other nodes within its limited transmission range. To facilitate communication between two nodes without a direct communication link, routing protocols must be developed to support multi-hop communication. Although many routing protocols have been proposed for ad hoc and sensor networks, most of them assume that other nodes are trustable and thus do not consider the security and attack issues. To assure a source node of finding a route to its destination, most routing protocols try to invite all available nodes to participate in the routing mechanism. This provides a lot of opportunities for attackers to destroy the routing mechanism. In this chapter, we briefly introduce some existing routing protocols, discuss the weaknesses of these protocols and possible types of attacks, and provide a comprehensive survey of recent research on defense approaches to these attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

DOS Attacks and Defenses at the Network Layer in AD-HOC and Sensor Wireless Networks, Wireless AD-HOC Sensor Networks: A Short Survey

Adhoc and sensor wireless networks are challenging and promising field for researchers. These networkingtechnology are not only significant on science and engineering but important on a broad range of applications such as critical infrastructure protection and security, disaster relief operations, biodiversity mapping, medicine and healthcare etc. Wireless Sensor Network applications require Wi...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007