A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Hi-index | 0.00 |
Secure authentication in routing protocols is increasingly becoming an issue of great importance. A threat in the form of wormhole attacks has presented itself. Using wormholes, an attacker can cripple and even completely disable wireless networks, with limited resources and no cryptographic information. Furthermore, wormhole attacks can serve as the launching pad for other types of attacks such as selective forwarding and eavesdropping. Because of the nature of wormhole attacks, security measures must be taken at the protocol level.