Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
ACM SIGCOMM Computer Communication Review
Mitigating denial of service attacks: a tutorial
Journal of Computer Security
New architecture for intra-domain network security issues
Communications of the ACM - Entertainment networking
Record path header for triangle routing attacks in IPv6 networks
WSEAS TRANSACTIONS on COMMUNICATIONS
Record path header for triangle routing attacks in IPv6 networks
WSEAS TRANSACTIONS on COMMUNICATIONS
Operational fault detection in network infrastructure
ICCOM'08 Proceedings of the 12th WSEAS international conference on Communications
SMEs and Cybersecurity Threats in E-Commerce
The EDP Audit, Control, and Security Newsletter
Association between nodes to combat blackhole attack in DSR based MANET
WOCN'09 Proceedings of the Sixth international conference on Wireless and Optical Communications Networks
A secure global state routing for mobile ad hoc networks
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks
International Journal of Business Data Communications and Networking
Hi-index | 0.25 |
The unprecedented growth of the Internet over the last years, and the expectation of an even faster increase in the numbers of users and networked systems, resulted in the Internet assuming its position as a mass communication medium. At the same time, the emergence of an increasingly large number of application areas and the evolution of the networking technology suggest that in the near future the Internet may become the single integrated communication infrastructure. However, as the dependence on the networking infrastructure grows, its security becomes a major concern, in light of the increased attempt to compromise the infrastructure. In particular, the routing operation is a highly visible target that must be shielded against a wide range of attacks. The injection of false routing information can easily degrade network performance, or even cause denial of service for a large number of hosts and networks over a long period of time. Different approaches have been proposed to secure the routing protocols, with a variety of countermeasures, which, nonetheless, have not eradicated the vulnerability of the routing infrastructure. In this article, we survey the up-to-date secure routing schemes. that appeared over the last few years. Our critical point of view and thorough review of the literature are an attempt to identify directions for future research on an indeed difficult and still largely open problem.