How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols

P Ning, K Sun - Ad Hoc Networks, 2005 - Elsevier
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing
protocols, using the Ad-hoc On-Demand Distance Vector (AODV) protocol as an example. It …

HADOF: Defense against routing disruptions in mobile ad hoc networks

W Yu, Y Sun, KJR Liu - … IEEE 24th Annual Joint Conference of …, 2005 - ieeexplore.ieee.org
HADOF is a set of mechanisms to protect mobile ad hoc networks against routing disruption
attacks launched by inside attackers. First, each node launches a route traffic observer to …

On vulnerability and protection of ad hoc on-demand distance vector protocol

W Wang, Y Lu, BK Bhargava - 10th International Conference on …, 2003 - ieeexplore.ieee.org
Vulnerabilities and attacks on the ad hoc on-demand distance vector (AODV) routing
protocol are investigated and studied via analysis and simulation. The attacks are classified …

Preventing replay attacks for secure routing in ad hoc networks

J Zhen, S Srinivas - International Conference on Ad-Hoc Networks and …, 2003 - Springer
The design of secure routing techniques is a crucial and challenging requirement in mobile
ad hoc networking. This is due to the fact that the highly dynamic nature of the ad hoc nodes …

Rushing attacks and defense in wireless ad hoc network routing protocols

YC Hu, A Perrig, DB Johnson - Proceedings of the 2nd ACM workshop …, 2003 - dl.acm.org
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each
other, allowing nodes to communicate beyond their direct wireless transmission range …

A specification-based intrusion detection system for AODV

CY Tseng, P Balasubramanyam, C Ko… - Proceedings of the 1st …, 2003 - dl.acm.org
The Ad hoc On-Demand Distance Vector (AODV) routing protocol, designed for mobile ad
hoc networks, offers quick adaptation to dynamic link conditions, low processing and …

Secure routing in mobile Ad hoc networks: A predictive approach

AM Desai, RH Jhaveri - International Journal of Information Technology, 2019 - Springer
In recent years, wireless technologies have gained enormous popularity and used vastly in
a variety of applications. Mobile Ad hoc Networks (MANETs) are temporary networks which …

[PDF][PDF] A new routing attack in mobile ad hoc networks

P Yi, Z Dai, S Zhang, Y Zhong - International Journal of …, 2005 - researchgate.net
Mobile ad hoc networks will often be deployed in environments where the nodes of the
networks are unattended and have little or no physical protection against tampering. The …

A new set of passive routing attacks in mobile ad hoc networks

J Kong, X Hong, M Gerla - IEEE Military Communications …, 2003 - ieeexplore.ieee.org
In hostile environments, adversaries can launch passive attacks against interceptable
routing information embedded in routing messages and data packets. Allowing adversaries …

Malicious AODV: implementation and analysis of routing attacks in MANETs

H Ehsan, FA Khan - … Conference on Trust, Security and Privacy …, 2012 - ieeexplore.ieee.org
From the security perspective Mobile Ad hoc Networks (MANETs) are amongst the most
challenging research areas and one of the key reasons for this is the ambiguous nature of …