Nothing Special   »   [go: up one dir, main page]

Lu et al., 2002 - Google Patents

Cooperative security-enforcement routing in mobile ad hoc networks

Lu et al., 2002

Document ID
17294839932547376370
Author
Lu B
Pooch U
Publication year
Publication venue
4th International Workshop on Mobile and Wireless Communications Network

External Links

Snippet

The characteristics of mobile ad hoc networks (MANET) introduce vulnerabilities to malicious attacks varying from passive eavesdropping to active interfering. With routing being a critical aspect for MANET, routing security is drawing increased attention. Yet, to …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
Pervaiz et al. Routing security in ad hoc wireless networks
Yih-Chun et al. A survey of secure wireless ad hoc routing
Fonseca et al. A survey of existing approaches for secure ad hoc routing and their applicability to VANETS
Boulaiche Survey of secure routing protocols for wireless ad hoc networks
Safwat et al. Survey and taxonomy of information-centric vehicular networking security attacks
Yang A study on improving secure routing performance using trust model in MANET
Tseng et al. Demem: Distributed evidence-driven message exchange intrusion detection model for manet
Lu et al. Cooperative security-enforcement routing in mobile ad hoc networks
Wan et al. Securing the destination-sequenced distance vector routing protocol (S-DSDV)
Vijayakumar et al. Study on reliable and secure routing protocols on manet
Sreedhar et al. A survey on security issues in wireless ad hoc network routing protocols
Tseng Distributed intrusion detection models for mobile ad hoc networks
Gharehkoolchian et al. Improving security issues in MANET AODV routing protocol
Sancak et al. Sensor wars: detecting and defending against spam attacks in wireless sensor networks
Tomar et al. A comparative study for secure routing in MANET
Mahore et al. Agent based black hole detection technique in aodv routing protocol
Lu et al. Cooperative Security-Enforcement Routing
Bhardwaj et al. Secure co-operative neighbour-based approach for detection and prevention of black hole attack in wireless mobile ad-hoc networks
Mehla et al. Analyzing security of authenticated routing protocol (ARAN)
Mahmood et al. An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks
Ferrag et al. OLSRBOOK: A PRIVACY-PRESERVING MOBILE SOCIAL NETWORK LEVERAGING ON SECURING THE OLSR ROUTING PROTOCOL.
de Biasi et al. Taxonomy of security attacks in opportunistic networks
Rana et al. Performance analysis of malicious node aware routing for MANET using two hop authentication
Attir et al. Logical wormhole prevention in optimized link state routing protocol
Zhang et al. Bounding packet dropping and injection attacks in sensor networks