Open Access   Article Go Back

Defending Against Source Routing Attacks and Packet Forwarding in Ad-Hoc Networks

S. Kolla1

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-5 , Page no. 129-133, May-2014

Online published on May 31, 2014

Copyright © S. Kolla . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Kolla, “Defending Against Source Routing Attacks and Packet Forwarding in Ad-Hoc Networks,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.129-133, 2014.

MLA Style Citation: S. Kolla "Defending Against Source Routing Attacks and Packet Forwarding in Ad-Hoc Networks." International Journal of Computer Sciences and Engineering 2.5 (2014): 129-133.

APA Style Citation: S. Kolla, (2014). Defending Against Source Routing Attacks and Packet Forwarding in Ad-Hoc Networks. International Journal of Computer Sciences and Engineering, 2(5), 129-133.

BibTex Style Citation:
@article{Kolla_2014,
author = {S. Kolla},
title = {Defending Against Source Routing Attacks and Packet Forwarding in Ad-Hoc Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2014},
volume = {2},
Issue = {5},
month = {5},
year = {2014},
issn = {2347-2693},
pages = {129-133},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=173},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=173
TI - Defending Against Source Routing Attacks and Packet Forwarding in Ad-Hoc Networks
T2 - International Journal of Computer Sciences and Engineering
AU - S. Kolla
PY - 2014
DA - 2014/05/31
PB - IJCSE, Indore, INDIA
SP - 129-133
IS - 5
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3464 3457 downloads 3544 downloads
  
  
           

Abstract

A wireless Ad-hoc network is the collection of wireless nodes that can co-operate by forwarding packets for each other to allow nodes to communicate directly. The prominence of the place of wireless ad-hoc networking is become more crucial to everyday functioning of people. This is due to obvious advantages of the wireless networks with ubiquity access and minimal hardware requirements in networks. The ad-hoc nature of sensor network means no structure can be statically defined. The network topology is always subject to change due to node failure, addition or mobility. Since nodes may fail or be replaced the network must support self-configuration. Routing and data forwarding is a crucial service for enabling communication in ad-hoc networks. Unfortunately, current routing protocols suffer from many security vulnerabilities. In this paper prior security work in this area focused primarily on source routing attacks. Low power wireless networks are an existing research direction in routing and packet forwarding.

Key-Words / Index Term

Security, Ad-Hoc Networks, Vulnerabilities, Wireless Networks, Sensor Networks, Resource Exhaustion Attacks, Route Disruption Attacks

References

[1]. Yih-Chun Hu, Adrian Perrig, and David B. Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks, MobiCom, 2002.
[2]. Yih-Chun Hu, David B. Johnson, and Adrian Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, IEEE workshop on mobile computing systems and applications, 2002.
[3]. Manel Guerrero Zapata and N. Asokan, Securing ad hoc routing protocols, WiSE, 2002.
[4]. Kihong Park and Heejo Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, INFOCOM, 2001.
[5]. Vern Paxson, An analysis of using reflectors for distributed denial-of service attacks, SIGCOMM Comput. Commun. Rev. 31 (2001), no. 3.
[6]. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks, INFOCOM, 2003.
[7]. Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig, Secure sensor network routing: A clean-slate approach, CoNEXT, 2006.
[8]. David B. Johnson, David A. Maltz, and Josh Broch, DSR: the dynamic source routing protocol for multihop wireless ad hoc networks, Ad hoc networking, 2001.
[9]. Lakshminarayanan Subramanian, Randy H. Katz, Volker Roth, Scott Shenker, and Ion Stoica, Reliable broadcast in unknown fixed-identity networks, Annual ACM SIGACT-SIGOPS symposium on principles of distributed computing, 2005.
[10]. Marcin Poturalski, Panagiotis Papadimitratos, and Jean-Pierre Hubaux, Secure neighbor discovery in wireless networks: Formal investigation of possibility, ACM ASIACCS, 2008.
[11]. Amitabh Saxena and Ben Soh, One-way signature chaining: a new paradigm for group cryptosystems, International Journal of Information and Computer Security 2 (2008), no. 3.
[12]. A Survey of Source Routing Protocols, Vulnerabilities and Security in Wireless Ad-hoc Networks, International journal of Computer Sciences and Engineering, 2014.