A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
The broadcast storm problem in a mobile ad hoc network
Wireless Networks - Selected Papers from Mobicom'99
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Routing security in wireless ad hoc networks
IEEE Communications Magazine
Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks
Journal of Network and Computer Applications
Enhanced dynamic source routing protocol for mitigating black hole attack
International Journal of Wireless and Mobile Computing
Hi-index | 0.24 |
In this paper, we propose a novel routing security algorithm, called promiscuous listening routing security algorithm, for mobile hosts to detect malicious attacks in the middle, such as packet dropping or modifying. After identifying the malicious nodes, mobile hosts can isolate these nodes. The proposed algorithm is distributed and does not need any communications between hosts. It only switches on the promiscuous listening mode in hosts. Through detailed simulations, the performance of data transmission is improved by the proposed algorithm. Even only when parts of hosts employ the algorithm intermittently, the improvement is obvious.