Malik et al., 2014 - Google Patents
Security for node isolation attack on OLSR by modifying MPR selection processMalik et al., 2014
- Document ID
- 9728597921589607512
- Author
- Malik D
- Mahajan K
- Rizvi M
- Publication year
- Publication venue
- 2014 First International Conference on Networks & Soft Computing (ICNSC2014)
External Links
Snippet
Mobile Ad hoc network is consists of mobile nodes and can organize them self without requiring any infrastructure. Due to wireless communication any node can join or leave network which causes lot of security constraint and due to limited battery many researchers …
- 238000002955 isolation 0 title abstract description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/48—Routing tree calculation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khanji et al. | ZigBee security vulnerabilities: Exploration and evaluating | |
Liu et al. | An acknowledgment-based approach for the detection of routing misbehavior in MANETs | |
Marimuthu et al. | Enhanced OLSR for defense against DOS attack in ad hoc networks | |
Malik et al. | Security for node isolation attack on OLSR by modifying MPR selection process | |
Yi et al. | A survey on security in wireless mesh networks | |
Aluvala et al. | An empirical study of routing attacks in mobile ad-hoc networks | |
Jain et al. | Detecting and overcoming blackhole attack in mobile Adhoc Network | |
Choudhary et al. | Preventing black hole attack in AODV using timer-based detection mechanism | |
Tayal et al. | A survey of attacks on manet routing protocols | |
Arfat et al. | A survey on secure routing protocols in wireless sensor networks | |
Chelani et al. | Detecting collaborative attacks by malicious nodes in MANET: An improved bait detection scheme | |
Gupta et al. | Mobile Ad hoc Network (MANETS): Proposed solution to Security Related Issues | |
Kumar et al. | SCMRP: Secure cluster based multipath routing protocol for wireless sensor networks | |
Alshamrani | PTT: packet travel time algorithm in mobile ad hoc networks | |
Ramaswami et al. | Smart handling of colluding black hole attacks in MANETs and wireless sensor networks using multipath routing | |
Palacharla et al. | Wormhole attack: a major security concern in internet of things (IoT) | |
Mahmoud et al. | A modified aodv routing protocol to avoid black hole attack in manets | |
Abirami et al. | An enhanced intrusion detection system for routing attacks in MANET | |
Tamilarasi et al. | Secure enhancement scheme for detecting selfish nodes in MANET | |
Goyal et al. | Securing MANET against wormhole attack using neighbor node analysis | |
Ezhilarasi et al. | Improving MPR selection algorithm in olsr Protocol based on dos free transmission in MANET MPR selection process | |
Al-Karaki | Analysis of routing security-energy trade-offs in wireless sensor networks | |
George et al. | Attack-resistant routing for wireless ad hoc networks | |
Panda et al. | Prevention of Black hole Attack in AODV protocols for Mobile Ad Hoc Network by Key Authentication. | |
Zhang et al. | Secure and energy-efficient routing for wireless sensor networks |