Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Proceedings of the 9th annual international conference on Mobile computing and networking
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Low-Cost Routing in Selfish and Rational Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
Expert Systems with Applications: An International Journal
The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes
IEEE Transactions on Mobile Computing
Expert Systems with Applications: An International Journal
MOEAQ: A QoS-Aware Multicast Routing algorithm for MANET
Expert Systems with Applications: An International Journal
Journal of Network and Computer Applications
Hi-index | 12.05 |
Routing misbehavior and collusion attack in Mobile Ad Hoc Networks (MANETs) are the main topics in this paper. Various techniques prevent routing misbehaviors have been published, but most of them do not consider the collusion attacks. Therefore, we propose the scheme called NACK to simultaneously detect routing misbehavior and collusion attacks, and to mitigate the effects of routing attacks. Furthermore, NACK scheme adopts an acknowledgment-based approach and timestamps comparison to resist the attacks mentioned above. The security analysis and simulation results are presented to evaluate the performance of NACK.