2014 International Symposium on Biometrics and Security Technologies (ISBAST) 2014
DOI: 10.1109/isbast.2014.7013125
|View full text |Cite
|
Sign up to set email alerts
|

Rushing attack against routing protocols in Mobile Ad-Hoc Networks

Abstract: Because of the nature of wireless channels, Mobile Ad-Hoc Networks (MANETs) are vulnerable against many threats and attacks. Beside of this, the mobility of the network nodes made the security of routing protocols one of the most interesting research areas over Ad-Hoc networks. Moreover, Rushing attack became one of the common attacks against routing protocols in MANETs. Although there are many researches over Rushing attacks, the security research community suffers from a famine of evidence to present the exa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…The combination of the "Use Best Approximation" and "Swift Implicit Response Round Trip Time" mechanism produces the Modified AODV and Hybrid Random Late Detection (HRLD) for route finding, time confine against the attacks like (Rushing attacks, Sybil attacks). In this research, the rushing attacks are taken because they allow denial-of-service, especially since these attacks make duplicate copies of the original mechanism and spread attack activities to the nearby nodes route by accessing route and also gain access to original sending data from source to destination [35] [36]. The three factors are followed in the ADABCP method.…”
Section: Figure 2 Activities Of Attacker Detection Automation Of Beesmentioning
confidence: 99%
See 3 more Smart Citations
“…The combination of the "Use Best Approximation" and "Swift Implicit Response Round Trip Time" mechanism produces the Modified AODV and Hybrid Random Late Detection (HRLD) for route finding, time confine against the attacks like (Rushing attacks, Sybil attacks). In this research, the rushing attacks are taken because they allow denial-of-service, especially since these attacks make duplicate copies of the original mechanism and spread attack activities to the nearby nodes route by accessing route and also gain access to original sending data from source to destination [35] [36]. The three factors are followed in the ADABCP method.…”
Section: Figure 2 Activities Of Attacker Detection Automation Of Beesmentioning
confidence: 99%
“…The ADABCP has two stages of route organization and route reorganization [36] [44] [45]. A partial solution with individual exploration and collective experience is generated in the pattern reorganization used in the pattern reorganization [44] [46].…”
Section: Algorithm For Attacker Detection Automation Of Bees Colony Optimization (Adabcp)mentioning
confidence: 99%
See 2 more Smart Citations