Lu et al., 2002 - Google Patents
Cooperative security-enforcement routing in mobile ad hoc networksLu et al., 2002
- Document ID
- 17294839932547376370
- Author
- Lu B
- Pooch U
- Publication year
- Publication venue
- 4th International Workshop on Mobile and Wireless Communications Network
External Links
Snippet
The characteristics of mobile ad hoc networks (MANET) introduce vulnerabilities to malicious attacks varying from passive eavesdropping to active interfering. With routing being a critical aspect for MANET, routing security is drawing increased attention. Yet, to …
- 238000001514 detection method 0 abstract description 21
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Pervaiz et al. | Routing security in ad hoc wireless networks | |
Yih-Chun et al. | A survey of secure wireless ad hoc routing | |
Fonseca et al. | A survey of existing approaches for secure ad hoc routing and their applicability to VANETS | |
Boulaiche | Survey of secure routing protocols for wireless ad hoc networks | |
Safwat et al. | Survey and taxonomy of information-centric vehicular networking security attacks | |
Yang | A study on improving secure routing performance using trust model in MANET | |
Tseng et al. | Demem: Distributed evidence-driven message exchange intrusion detection model for manet | |
Lu et al. | Cooperative security-enforcement routing in mobile ad hoc networks | |
Wan et al. | Securing the destination-sequenced distance vector routing protocol (S-DSDV) | |
Vijayakumar et al. | Study on reliable and secure routing protocols on manet | |
Sreedhar et al. | A survey on security issues in wireless ad hoc network routing protocols | |
Tseng | Distributed intrusion detection models for mobile ad hoc networks | |
Gharehkoolchian et al. | Improving security issues in MANET AODV routing protocol | |
Sancak et al. | Sensor wars: detecting and defending against spam attacks in wireless sensor networks | |
Tomar et al. | A comparative study for secure routing in MANET | |
Mahore et al. | Agent based black hole detection technique in aodv routing protocol | |
Lu et al. | Cooperative Security-Enforcement Routing | |
Bhardwaj et al. | Secure co-operative neighbour-based approach for detection and prevention of black hole attack in wireless mobile ad-hoc networks | |
Mehla et al. | Analyzing security of authenticated routing protocol (ARAN) | |
Mahmood et al. | An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks | |
Ferrag et al. | OLSRBOOK: A PRIVACY-PRESERVING MOBILE SOCIAL NETWORK LEVERAGING ON SECURING THE OLSR ROUTING PROTOCOL. | |
de Biasi et al. | Taxonomy of security attacks in opportunistic networks | |
Rana et al. | Performance analysis of malicious node aware routing for MANET using two hop authentication | |
Attir et al. | Logical wormhole prevention in optimized link state routing protocol | |
Zhang et al. | Bounding packet dropping and injection attacks in sensor networks |