Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Intrusion detection techniques for mobile wireless networks
Wireless Networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
On Using Reputations in Ad hoc Networks to Counter Malicious Nodes
ICPADS '04 Proceedings of the Parallel and Distributed Systems, Tenth International Conference
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In this paper we analyze attacks that deny channel access by causing pockets of congestion in mobile networks. Such attacks would essentially prevent one or more nodes from accessing or providing specific services. Here we focus on the properties of the most commonly used routing protocol, the AODV, which enables such attacks. We propose a new routing protocol which we call as BT_AODV protocol to mitigate these DOS attacks. We make use of Blacklist table method to isolate the malicious node from the network. The malicious node is circumvented at various stages of the routing protocol. In this method the intruder's node is denied all the services provided by the network. Our analysis and simulation show that providing BT_ AODV protocol with blacklist table method alleviates the effects of such attacks.