Survey of Secure Routing Protocols for Wireless Ad Hoc Networks

被引:15
作者
Boulaiche, Mehdi [1 ]
机构
[1] Univ 20 August 1955 Skikda, Dept Comp Sci, Skikda, Algeria
关键词
Wireless ad-hoc networks; Secure routing; Reputation; Adversary; Security attack; Survey; BLACK-HOLE ATTACK; WORMHOLE ATTACK; MANET; VERIFICATION; MANAGEMENT; DISCOVERY; DEFENSE; OLSR; DSR;
D O I
10.1007/s11277-020-07376-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The diverse network technologies and low-end wireless technologies have enabled the deployment of self-organized wireless ad hoc networks. Nodes forming such networks have the ability to autonomously organize and cooperate among them to form an infrastructure that allows data communication in the network. Routing protocols constitute the core of this cooperation. Many routing protocols have been developed to achieve data communication in wireless ad hoc networks and a large number of high quality research papers have appeared and addressed the issue of routing at length. Although they have proved their effectiveness, these routing protocols have been designed for trustworthy environments without any security requirements. However, the presence of an adversary in the network can degrade the routing functionalities and may breaking down the entire network. Therefore, securing routing protocols in such networks becomes an issue. In this paper, we survey the-state-of-the-art of secure routing protocols proposed in the literature that address routing security issue, classifying secure routing protocols in categories according to the secured protocol, and finally discussing the proposed solutions.
引用
收藏
页码:483 / 517
页数:35
相关论文
共 72 条
[1]   Agent-based trusted on-demand routing protocol for mobile ad-hoc networks [J].
Abdel-Halim, Islam Tharwat ;
Fahmy, Hossam Mahmoud Ahmed ;
Bahaa-Eldin, Ayman Mohammad .
WIRELESS NETWORKS, 2015, 21 (02) :467-483
[2]   Provably secure on-demand source routing in mobile ad hoc networks [J].
Acs, Gergely ;
Buttyan, Levente ;
Vajda, Istvan .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (11) :1533-1546
[3]  
Ade S.A., 2010, INT J INF TECH KNOWL, V2, P545
[4]   Review on MANET Based Communication for Search and Rescue Operations [J].
Anjum, Shaik Shabana ;
Noor, Rafidah Md. ;
Anisi, Mohammad Hossein .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (01) :31-52
[5]  
[Anonymous], 2002, SCS COMM NETW DISTR
[6]  
[Anonymous], 2012, J NETWORK COMPUTER A, DOI DOI 10.1016/j.jnca.2012.01.019
[7]  
[Anonymous], 2002, P 1 ACM WORKSH WIR S
[8]  
Avramopoulos I., 2004, INFOCOM 2004 23 ANN
[9]  
Awerbuch B, 2008, ACM T INFORM SYST SE, V10, DOI [10.1145/1284680.1341892, 10.1145/1284680.1284686]
[10]   Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks [J].
Baadache, Abderrahmane ;
Belmehdi, Ali .
COMPUTER NETWORKS, 2014, 73 :173-184