CN101453733A - Wormhole attack detection method based on monitor node in wireless Mesh network - Google Patents

Wormhole attack detection method based on monitor node in wireless Mesh network Download PDF

Info

Publication number
CN101453733A
CN101453733A CNA2008102276970A CN200810227697A CN101453733A CN 101453733 A CN101453733 A CN 101453733A CN A2008102276970 A CNA2008102276970 A CN A2008102276970A CN 200810227697 A CN200810227697 A CN 200810227697A CN 101453733 A CN101453733 A CN 101453733A
Authority
CN
China
Prior art keywords
node
network
nodes
attack
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008102276970A
Other languages
Chinese (zh)
Other versions
CN101453733B (en
Inventor
何泾沙
付颖芳
李国瑞
肖鹏
王戎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN2008102276970A priority Critical patent/CN101453733B/en
Publication of CN101453733A publication Critical patent/CN101453733A/en
Application granted granted Critical
Publication of CN101453733B publication Critical patent/CN101453733B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a wormhole attack detection method based on monitoring nodes in a wireless Mesh network, which belongs to the field of computer network. When a source node transmits information to a destination node, all the monitoring nodes on a path monitor the transmission conditions of packages of corresponding links; if the packet loss ratio of a certain link is found to be more than a maximum threshold value after statistics, a monitoring node reports to a regional router and indicates that the link is wormhole; the regional router starts a voting mechanism based on the monitoring node, and two nodes at both ends of the link are wormhole attack nodes if most monitoring nodes vote that the link is wormhole; the regional router temporarily isolates the two nodes and transmits report information to a core router; and the core router cancels authorization certificates of the two wormhole attack nodes and expels the two wormhole attack nodes out of the network. The method can guarantee that malicious attack nodes of the wireless Mesh network are detected and isolated when launching a wormhole attack by utilization of high bandwidth.

Description

In the wireless Mesh netword based on the Wormhole attack detection method of monitor node
Technical field
The present invention relates to a kind of Wormhole attack detection method, can be applied to utilize in the Wireless Mesh network high bandwidth to initiate the detection that the worm hole is attacked, belong to computer network field based on monitor node.
Background technology
In Wireless Mesh network, existing Routing Protocol supposes that mostly communicating pair is in the environment communication of a safety, more just pays close attention to the routing and the strategy thereof of route, seldom considers safety problem.Yet because the role that the Mesh client also has route, the Mesh node can be initiated various attack according to establishing route information, deletion or the routed path that upgrades in the network.It is exactly wherein very dangerous attack pattern that the worm hole is attacked.It is that two collusion malicious node X, Y are by setting up the privately owned passage of a high-quality high-bandwidth that the worm hole is attacked, X position identifying recording layer bag or the position information of assailant in network is delivered to the information of stealing by this privately owned passage the Y place, another one position of network.Because the distance of privately owned passage is generally greater than the single-hop wireless transmission, so compare by the early destination node that arrives of normal multihop path data packets transmitted by privately owned passage data packets transmitted.When communication user is chosen the privately owned passage of X and Y, when communicating, X and Y will initiate to abandon whole bags or only transmit the part bag, revise attacks such as bag.Even exist to trust between this network communication and authentication, and the assailant still can attack when there is no key.What is worse, unlike the malicious node in the Routing Protocol, they can be located easily, and worm hole assailant is sightless for higher level, and the worm hole is sightless with the assailant who is arranged in two ends, worm hole in the path.Therefore, needing a kind of safer measure to detect the worm hole attacks to guarantee the application safety of Wireless Mesh network.The Sastry of University of California-Berkeley, Shnakar and Wagner propose the Eeho agreement, in this agreement, only belong to and use the node of radio frequency or ultrasonic wireless network could be in the proof zone.Unproved node own sends a ultrasonic signal to certified node in order to prove in the zone of proof, the time of receiving ultrasonic signal that oneself certified node obtains by it determines that this unproved node is whether in the zone that proves.The advantage of this agreement is not need encryption technology and strict clock synchronization.Although radiofrequency signal is used in most of Wireless Communication Equipment, to attack in order to detect the worm hole, each network equipment needs extra equipment to detect and launches supersonic frequency, and this can cause the increase of network cost.He.Tian etc. have proposed ApIT, and the node location in the network is determined in its use Delta Region.This method is calculated some node whether in the Delta Region of forming by the node that has GPS.These calculate the relative position of determining all nodes in the network, can help prevent the worm hole outside the Delta Region to attack, but the worm hole in the Delta Region are attacked and cannot be prevented.The faint signal strength signal intensity of utilizing Bulusu, Heidemann and Estrin detects the worm hole and attacks, but signal strength signal intensity is an indefinite parameter, it is subjected to the interference of surrounding environment easily, same node, the signal that send same position, because the change of environment, and become strong or a little less than.Hu.Lingxuan, whether the antenna direction of DavidEvnas utilization transmission signal node and received signal node antenna direction mate has determined whether the attack of worm hole, this restriction, to move with random communicating by letter be a kind of restriction to random between can the be quiet movable Mesh node.Yih-Chun Hu etc. has proposed based on packet restriction (PaeketLeashes) method, and this method limits the maximum transmission distance of sending node by regional restriction of adding in packet or time domain restriction.Agreement adopts the TIK authentication protocol to detect and defends the worm hole to attack simultaneously, promptly mates timestamp above-mentioned in each packet and position and stabs so that whether the invasion of worm hole is arranged in the detection system.Each node all has individual PKI in this TIK agreement, and each node will be with PKI openly to other user, and this has increased the bandwidth of the memory space and the network of each node.
Summary of the invention
In order to prevent in the Wireless Mesh network that malicious attack nodes utilizes high bandwidth to initiate the worm hole and attack, we have proposed a kind of Wormhole attack detection method based on monitor node, can be detected when the worm hole is attacked and be isolated initiating to guarantee malicious attack nodes.
The invention provides a kind of network model towards worm hole attack detecting, this network model has following feature:
(1) backbone network is arranged, have two P in the backbone network at least, these P by the thresholding system form virtual CA, one notified have attack under the situation that node exists just off-line CA, warrant stack room of having only P to visit of access network.In all P, have two P and Internet net wired connection at least;
(2) at least two regional networks have 2 area routers in each regional network, each area router links to each other with the terminal use with P.Share a database of depositing user ID, area I D, authorization key and user profile (identity card, mailbox, mailing address, mobile phone) between the area router.
(3) in backbone network, adopt high-speed radio to connect, in regional network, adopt low speed to connect;
(4) communicating pair communication is verified mutually by the certificate of authority, adopts the cipher mode based on identity to come transmission information;
(5) source node and destination node are not to attack node, and the P of at least one area router and the virtual CA of formation is not a malicious attack nodes;
The present invention proposes in a kind of wireless Mesh netword to it is characterized in that based on the Wormhole attack detection method of monitor node, may further comprise the steps:
(1) off-line CA for P, area router, user node distribute public private key pair and public key certificate, is backbone network and each Local Area Network distribution public private key pair when initialization;
(2) application node submits to public key certificate that off-line CA issues to virtual CA, the public key certificate authentication application node that virtual CA issues with off-line CA; These application node comprise user node, P and area router;
(3) after application node is passed through by virtual ca authentication, issue the certificate of authority and based on the private key of identity, these certificate of authoritys all leave in the warrant stack room, these warrant stack room have only P to visit;
(4) area router is selected monitor node according to user's data storage capacity, level of security.Monitor node is the node with such characteristic one class, and promptly it can monitor the situation of giving out a contract for a project of certain bar link, and the record of giving out a contract for a project is existed in its buffer memory.For example, if node C is the monitor node of link A-B, so A and B all C be neighbor node, all in the supervision of C, promptly what bag A and B have sent out to A and B transmitting-receiving bag situation, C will leave the sign of the sign of being given out a contract for a project and the node of giving out a contract for a project in its buffer memory together.
(5) when sending node and receiving node communicated, monitor node monitored the turnover situation of these all bags of link, and is recorded in the buffer memory, adopts testing process as described below again, and whether detect has the worm hole to attack, and testing process as shown in Figure 1;
(6) if monitoring certain sending node, monitor node sent x bag, receiving node has been transmitted y bag when transmitting bag again after receiving bag, the Loss Rate γ of monitor node statistical packages=(x-y/x) * 100%, if γ〉τ, so just think that having the worm hole to attack exists, monitor node will be reported to area router and point out that this link is the worm hole.At formula γ〉among the τ, γ is the Loss Rate of bag, and τ is the max threshold that system specifies the Loss Rate of bag, and the normal packet loss when the τ value runs well according to network is set;
When (7) area router is received the report information of monitor node, area router will start the voting mechanism based on monitor node, i.e. active call or the passive report result who adds up other monitor node within a certain period of time;
(8) this link is the worm hole if most of monitor node is all voted, and promptly two of this both link ends nodes are attacked node for the worm hole, and area router is attacked node to the worm hole and temporarily isolated;
(9) area router is attacked user and the P that information announcement is given whole Local Area Network to this simultaneously;
(10) P will be cancelled the certificate of authority that node is attacked in two worm holes, evict network from thereby node is attacked in these two worm holes;
Communication in step between the user, monitor node report information all adopt encryption method based on identity for P for area router and area router report information.
The objective of the invention is to utilize high bandwidth to initiate a kind of Wormhole attack detection method that the attack of worm hole proposes based on monitor node for the Wireless Mesh network users exempts from.Use this method can guarantee that the Wireless Mesh network malicious attack nodes utilizing high bandwidth to initiate in time to be detected and be isolated when the worm hole is attacked, guarantees the fail safe of network; And with Sastry, Shnakar compares with the Eeho agreement that Wagner proposes, and our mechanism does not need each network equipment to have extra equipment to detect and launches supersonic frequency; Compare with the ApIT detection method of propositions such as He.Tian, our false drop rate improves greatly, because the ApIT detection method cannot detect the worm hole in the specific Delta Region, and we utilize a large amount of statistical methods, according to the threshold value τ of network size, user's daily behavior feature-set packet loss, so our method also can detect the worm hole of specific Delta Region; With Bulusu, Heidemann utilizes faint signal strength signal intensity to detect worm hole attack method with Estrin and compares, and our mechanism does not rely on and is subjected to the very big signal power that influences of environmental factor to detect the worm hole to attack; With Hu.Lingxuan, whether the antenna direction that DavidEvnas utilize to send signal node and received signal node antenna direction mate is determined to detect the method for attacking in the worm hole and compares, and our mechanism does not rely on the coupling of aerial angle to detect the worm hole and attacks; Proposed to compare based on the detection method of packet restriction with Yih-Chun Hu etc., our mechanism adopts the encryption method based on identity, and this significantly reduces network because of storage of public keys and open needed memory space of PKI and bandwidth.As seen our worm hole attack detecting mechanism be a kind of effectively, availability is strong, can resist the detection method that the worm hole is attacked, and can prevent and alleviate the behavior of worm hole attacks such as suffering packets of information is dropped, revises, leakage, reached our the set goal.
Description of drawings
Fig. 1 testing process figure of the present invention
Fig. 2 attack model figure of the present invention
Fig. 3 network model figure of the present invention
Embodiment
The present invention is directed to Microsoft is a kind of attack model of utilizing high bandwidth to initiate the attack of worm hole of link-quality source routing MR-LQSR (Multi-Radio Link-Quality Source Routing) agreement proposition of the many radio frequencies of support of Wireless Mesh network research and development.
The MR-LQSR agreement adopts a kind of new routing performance criterion, is called weighted cumulative transmission time WCETT (Weighted Cumulative Expected Transmission Time).Its expression formula is shown in equation (1) and equation (2):
WCETT = ( 1 - β ) * Σ i = 1 h ETT i + β * max 1 ≤ j ≤ k x j - - - ( 1 )
Figure A200810227697D00072
In equation (1) and equation (2), h is that certain bar route is jumped quantity of links through h, and k is the channel number that adopts in the system, ETT iBe the transmission time of a bag of transmission on link i, x jBe that channel j goes up the needed time of transmission package, β is a variable element value, and its scope is 0≤β≤1.When all channels can both be fully utilized, β=0.WCETT has taken all factors into consideration factors such as link performance parameters such as bandwidth and minimum hop count, but all channels all are fully utilized or WCETT weights when equating, two malicious attack nodes can be utilized the weakness of this Routing Protocol, initiate the worm hole and attack.Shown in Figure 2 as attack model, source node S wants to look for a best route to communicate by letter with destination node D.Malicious node X and Y set up a privately owned tunnel of high bandwidth between them, three routes, i.e. S-E-F-D-G-H-D, S-Q-X-A-B-C-Y and S-Q-X-Y-D are arranged from source node S to destination node D like this.Because the WCETT value of S-Q-X-Y-D is 10, the WCETT value of S-Q-X-A-B-C-Y is 11, and the WCETT value of S-E-F-D-G-H-D is 12.In these three roads had, it was best route that destination node D will select to make the minimum S-Q-X-Y-D of WCETT value because of bandwidth is high.When source node S packets of information when route S-Q-X-Y-D issues destination node D, malicious attack nodes X and Y just launch a offensive, and such as the deletion bag, only transmit the part bag, revise bag etc.
In order to realize above-mentioned target, we implement network model as shown in Figure 3, utilize the Wormhole attack detection method based on monitor node to detect the worm hole point of attack and isolate it again.
1. network model
Designed network model as shown in Figure 3, this model has following feature:
(1) whole Wireless Mesh network is made up of a backbone network and two Local Area Networks.
(2) backbone network is made up of 4 P, and one notified has and attack under the situation that node exists just off-line CA and warrant stack room of having only P to visit of access network.In all P, two P and Internet net wired connection are arranged.
(3) there are 2 area routers to link to each other with the terminal use in each regional network with P.Share a database of depositing user ID, area I D, authorization key and user profile (identity card, mailbox, mailing address, mobile phone) between the area router.
(4) in backbone network, adopt the 54Mbps wireless connections, in regional network, adopt 11Mbps to connect;
(5) communicating pair communication is authorized private key and the certificate of authority of application node based on identity by 4 P of backbone network by (4,3) thresholding system; The certificate of authority is verified mutually, adopts the cipher mode based on identity to come transmission information;
(6) source node and destination node are not to attack node, and at least one an area router and m P is not a malicious attack nodes;
(7) geographical position of each node can both obtain exactly by GPS (Global Positioning System).
2. detection step
With attack model Fig. 2 is that example illustrates that our Wormhole attack detection method can reach the worm hole attack that detection utilizes high bandwidth to initiate.
(1) off-line CA for P, area router, user node distribute public private key pair and public key certificate, is backbone network and each Local Area Network distribution public private key pair when initialization;
(2) application node submits to public key certificate that off-line CA issues to virtual CA, the public key certificate authentication application node that virtual CA issues with off-line CA; These application node comprise user node, P and area router;
(3) after application node is passed through by virtual ca authentication, issue the certificate of authority and based on the private key of identity, these certificate of authoritys all leave in the warrant stack room, these warrant stack room have only P to visit;
(4) area router is specified monitor node according to user's data storage capacity, level of security.In attack model Fig. 2, area router specified node I is the monitor node of link Q-X, and node A, B, C, P, K and node M are the monitor nodes of link X-Y, and L is the monitor node of link Y-D;
(5) when source node S when route S-Q-X-Y-D sends packet to destination node D, the situation of giving out a contract for a project of monitor node I monitoring link Q-X, the situation of giving out a contract for a project of monitor node L monitoring link Y-D, and the situation of giving out a contract for a project is recorded in separately the buffer memory, adopt testing process as described below again, whether have worm hole attack, testing process as shown in Figure 1 if detecting;
(6) sent x bag as malice sending node X, malice receiving node Y has only transmitted y bag when transmitting bag, the Loss Rate γ of monitor node A, B, C, P, K and node M statistical packages=(x-y/x) * 100%, if γ〉τ, so just think that having the worm hole to attack exists, and develops simultaneously and offers area router Zr, at formula γ〉among the τ, γ is the Loss Rate of bag, and τ is the max threshold that system specifies the Loss Rate of bag, and the packet loss the when value of τ runs well according to network is set.In our enforcement, when network ran well, normal packet loss was less than 10%, and therefore setting τ is 10%, that is to say if the packet loss of certain bar link greater than 10%, we just think that this link is the worm hole;
When (7) area router Zr receives article one report information, area router will start the voting mechanism based on monitor node, and promptly all monitor nodes of this link of active call return and monitor this link give out a contract for a project situation or the passive report result who adds up other monitor node within a certain period of time;
(8) if in monitor node A, B, C, P, K and the node M, it is the worm hole that monitor node more than 4 the X-Y link of all voting is arranged, and these two nodes of X and Y are that node is attacked in the worm hole, and area router Zr attacks nodes X to the worm hole and Y temporarily isolates so;
(9) area router Zr attacks user and the P Br that information announcement is given whole Local Area Network to this simultaneously;
(10) P Br will cancel the certificate of authority that nodes X and Y are attacked in two worm holes, thereby this X and these two nodes of Y are evicted from network;
Communication between the user, monitor node report information all adopt encryption method based on identity for P Br for area router Zr and area router Zr report information.

Claims (1)

  1. In the wireless Mesh netword based on the Wormhole attack detection method of monitor node, it is characterized in that, may further comprise the steps:
    (1) off-line CA for P, area router, user node distribute public private key pair and public key certificate, is backbone network and each Local Area Network distribution public private key pair when initialization;
    (2) application node submits to public key certificate that off-line CA issues to virtual CA, the public key certificate authentication application node that virtual CA issues with off-line CA; These application node comprise user node, P and area router;
    (3) after application node is passed through by virtual ca authentication, issue the certificate of authority and based on the private key of identity, these certificate of authoritys all leave in the warrant stack room, these warrant stack room have only P to visit;
    (4) area router is selected monitor node according to user's data storage capacity, level of security; Monitor the situation of giving out a contract for a project of certain bar link, and the record of giving out a contract for a project is existed in its buffer memory;
    (5) when sending node and receiving node communicated, monitor node monitored the turnover situation of these all bags of link, and is recorded in the buffer memory, adopts testing process as described below again, and whether detect has the worm hole to attack;
    (6) if monitoring certain sending node, monitor node sent x bag, receiving node has been transmitted y bag when transmitting bag again after receiving bag, the Loss Rate γ of monitor node statistical packages=(x-y/x) * 100%, if γ〉τ, so just think that having the worm hole to attack exists, monitor node will be reported to area router and point out that this link is the worm hole.At formula γ〉among the τ, γ is the Loss Rate of bag, and τ is the max threshold that system specifies the Loss Rate of bag, and the normal packet loss when the τ value runs well according to network is set;
    When (7) area router is received the report information of monitor node, area router will start the voting mechanism based on monitor node, i.e. the report result of active call or passive other monitor node of statistics;
    (8) this link is the worm hole if most of monitor node is all voted, and promptly two of this both link ends nodes are attacked node for the worm hole, and area router is attacked node to the worm hole and temporarily isolated;
    (9) area router is attacked user and the P that information announcement is given whole Local Area Network to this simultaneously;
    (10) P will be cancelled the certificate of authority that node is attacked in two worm holes, evict network from thereby node is attacked in these two worm holes;
    Communication between the user, monitor node report information all adopt encryption method based on identity for P for area router and area router report information.
CN2008102276970A 2008-11-28 2008-11-28 Wormhole attack detection method based on monitor node in wireless Mesh network Expired - Fee Related CN101453733B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008102276970A CN101453733B (en) 2008-11-28 2008-11-28 Wormhole attack detection method based on monitor node in wireless Mesh network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008102276970A CN101453733B (en) 2008-11-28 2008-11-28 Wormhole attack detection method based on monitor node in wireless Mesh network

Publications (2)

Publication Number Publication Date
CN101453733A true CN101453733A (en) 2009-06-10
CN101453733B CN101453733B (en) 2010-12-22

Family

ID=40735698

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008102276970A Expired - Fee Related CN101453733B (en) 2008-11-28 2008-11-28 Wormhole attack detection method based on monitor node in wireless Mesh network

Country Status (1)

Country Link
CN (1) CN101453733B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102131193A (en) * 2010-01-12 2011-07-20 中国人民解放军总参谋部第六十一研究所 Secure routing method for converged network of wireless sensor network and computer network
CN107071780A (en) * 2017-04-17 2017-08-18 中国民航大学 A kind of wireless Mesh netword malicious node detection method
CN108600210A (en) * 2018-04-17 2018-09-28 四川斐讯信息技术有限公司 A kind of voting method and wireless router based on wireless router
CN109152065A (en) * 2018-10-31 2019-01-04 重庆邮电大学 A kind of safe method of network entry of industry wireless network multinode based on IPv6
CN113196703A (en) * 2018-12-18 2021-07-30 源有限公司 System and method for protecting computer networks from man-in-the-middle attacks

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110670A (en) * 2006-07-17 2008-01-23 西安电子科技大学 Key management method based on wireless Mesh netword
CN101222331B (en) * 2007-01-09 2013-04-24 华为技术有限公司 Authentication server, method and system for bidirectional authentication in mesh network

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102131193A (en) * 2010-01-12 2011-07-20 中国人民解放军总参谋部第六十一研究所 Secure routing method for converged network of wireless sensor network and computer network
CN107071780A (en) * 2017-04-17 2017-08-18 中国民航大学 A kind of wireless Mesh netword malicious node detection method
CN107071780B (en) * 2017-04-17 2020-02-18 中国民航大学 Malicious node detection method for wireless Mesh network
CN108600210A (en) * 2018-04-17 2018-09-28 四川斐讯信息技术有限公司 A kind of voting method and wireless router based on wireless router
CN109152065A (en) * 2018-10-31 2019-01-04 重庆邮电大学 A kind of safe method of network entry of industry wireless network multinode based on IPv6
CN109152065B (en) * 2018-10-31 2022-03-25 重庆邮电大学 IPv 6-based industrial wireless network multi-node secure network access method
CN113196703A (en) * 2018-12-18 2021-07-30 源有限公司 System and method for protecting computer networks from man-in-the-middle attacks

Also Published As

Publication number Publication date
CN101453733B (en) 2010-12-22

Similar Documents

Publication Publication Date Title
Tanwar et al. A systematic review on security issues in vehicular ad hoc network
CN101304384B (en) Safety routing method for amalgamation network of honeycomb network and self-organization network with enhanced security
CN101453733B (en) Wormhole attack detection method based on monitor node in wireless Mesh network
Bhuvaneswari et al. Denial of service attack solution in OLSR based manet by varying number of fictitious nodes
CN103841553B (en) A kind of hybrid wireless Mesh network routing safety and the method for secret protection
Gu et al. Vehicle driving pattern based sybil attack detection
Tseng et al. Demem: Distributed evidence-driven message exchange intrusion detection model for manet
CN101447899B (en) Method for detecting end-to-end-based wormhole attack in wireless Mesh network
Hamdi et al. Effect Sybil attack on security Authentication Service in VANET
Kolade et al. Performance analysis of black hole attack in MANET
Jeevamaheswari et al. AODV routing protocol to defence against packet dropping gray hole attack In MANET
Velayudhan et al. Review on avoiding Sybil attack in VANET while operating in an urban environment
Bayou Assessment and enforcement of wireless sensor network-based SCADA systems security
Nausheen et al. ETSAODV: An Efficient and Trusted Secure AODV with Performance Analysis for MANETS suffering Blackhole Attack
Patel et al. A brief analysis on detection and avoidance techniques of wormhole attack in MANET
Kumar et al. Novel Scheme for Mutual Authentication to Isolate Sinkhole Attack in Wireless Sensor Networks
Deeptha A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs
Shah et al. MANET: IMPROVED SECURED ROUTING FOR AODV
Porwal et al. Review of internal security attacks in vehicular ad hoc networks (VANETs)
de Biasi et al. Taxonomy of security attacks in opportunistic networks
Ahir et al. IAMTT-new method for resisting network layer denial of service attack on MANET
Pandilakshmi et al. Detecting And Prevent The Wormhole Attack Using Customized Evolution
Namdev et al. Efficient and secure communication in vehicular adhoc network
Nabou et al. Shapiro-Wilk Test to Detect The Routing Attacks In MANET
Pahal et al. A Cryptographic Handshaking Approach to Prevent Wormhole Attack in MANET

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20101222

Termination date: 20141128

EXPY Termination of patent right or utility model