Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks

@article{Azer2009ImmuningRP,
  title={Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks},
  author={Marianne Azer and Sherif El-Kassas and Magdy S. El-Soudani},
  journal={2009 Fourth International Conference on Systems and Networks Communications},
  year={2009},
  pages={30-36}
}
Ad hoc networks can be rapidly deployed and reconfigured. Hence, they are very appealing as they can be tailored to lots of applications. Due to their features they are vulnerable to attacks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack a malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant point, which replays them locally. In this… CONTINUE READING
Highly Cited
This paper has 19 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 12 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 21 references

WAPN: A Distributed Wormhole Attack Detection Approach for Wireless Sensor Networks

F. KONG, C. LI, Q.DING, G. CUI, B. CUI
Journal of Zhejiang University SCIENCE A, vol. 10, p. 279~289, February 2009. • 2009
View 1 Excerpt

An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Networks,

L. Gunhee, S. Jungtaek
Proceedings of the 2008 International Conference on Information Security and Assurance (ISA • 2008
View 1 Excerpt

FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks

2008 Second International Conference on Emerging Security Information, Systems and Technologies • 2008
View 1 Excerpt

WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks

2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008) • 2008
View 1 Excerpt

An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks

31st Annual International Computer Software and Applications Conference (COMPSAC 2007) • 2007
View 1 Excerpt

Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information

IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications • 2007
View 1 Excerpt

Intrusion Detection Techniques in Wireless Ad Hoc Networks

30th Annual International Computer Software and Applications Conference (COMPSAC'06) • 2006
View 1 Excerpt

Similar Papers

Loading similar papers…