The invisible node attack revisited

被引:4
作者
Andel, Todd R. [1 ]
Yasinsac, Alec [1 ]
机构
[1] Florida State Univ, Tallahassee, FL 32306 USA
来源
PROCEEDINGS IEEE SOUTHEASTCON 2007, VOLS 1 AND 2 | 2007年
关键词
D O I
10.1109/SECON.2007.342988
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Route security is vital to MANET operation and reliability. If a malicious host can inject itself into the routing path or alter the routing path, route security has failed In this paper we focus on the Invisible Node Attack (INA), an important, unsolved wireless network attack. We provide an INA formal definition and show why proposed solutions throughout the literature have not eliminated this critical attack. Since there is no existing INA solution, we provide a discussion on its potential impacts on ad hoc routing protocols.
引用
收藏
页码:686 / 691
页数:6
相关论文
共 23 条
[1]   Provably secure on-demand source routing in mobile ad hoc networks [J].
Acs, Gergely ;
Buttyan, Levente ;
Vajda, Istvan .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (11) :1533-1546
[2]  
[Anonymous], P 1 INT WORKSH PEER
[3]  
BARBEAU M, 2006, LNCS, V4074
[4]  
BETH T, 1991, LECT NOTES COMPUT SC, V537, P169
[5]  
BURMESTER M, UNPUB NETWORK SECURI
[6]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[7]   Characteristics of radio transmitter fingerprints [J].
Ellis, KJ ;
Serinken, N .
RADIO SCIENCE, 2001, 36 (04) :585-597
[8]  
*FED AV ADM, WID AR AUGM SYST
[9]  
*FED HIGHW ADM, NAT DIFF GLOB POS SY
[10]  
HOKANSON E, 2006, THESIS FLORIDA STATE