Security Issues in Mobile Ad Hoc Networks
dc.contributor.author | Sandoval Orozco, Ana Lucila | |
dc.contributor.author | García Matesanz, Julián | |
dc.contributor.author | García Villalba, Luis Javier | |
dc.contributor.author | Márquez Díaz, José Duván | |
dc.contributor.author | Kim, T.H. | |
dc.date.accessioned | 2023-06-20T00:21:08Z | |
dc.date.available | 2023-06-20T00:21:08Z | |
dc.date.issued | 2012 | |
dc.description.abstract | Ad hoc networks are built on the basis of a communication without infrastructure and major investigations have focused on the routing and autoconfiguration problems. However, there is a little progress in solving the secure autoconfiguration problems in mobile ad hoc networks (MANETs), which has led to the proliferation of threats given the vulnerabilities of MANETs. It is clear that ad hoc networks have no centralized mechanism for defense against threats, such as a firewall, an intrusion detection system, or a proxy. Therefore, it is necessary that the defense of interests of each of the ad hoc components is the responsibility of each member node. This paper shows the most common threats to ad hoc networks and reviews several proposals that attempt to minimize some of these threats, showing their protection ability and vulnerabilities in light of the threats that might arise | |
dc.description.department | Sección Deptal. de Sistemas Informáticos y Computación | |
dc.description.faculty | Fac. de Ciencias Matemáticas | |
dc.description.refereed | TRUE | |
dc.description.sponsorship | Agencia Espanola de Cooperacion Internacional para el Desarrollo (AECID, Spain) through Accion Integrada MAEC-AECID Mediterraneo | |
dc.description.sponsorship | Departamento Administrativo de Ciencia, Tecnologia e Innovacion (COLCIENCIAS, Colombia) through Programa de Recuperacion Contingente | |
dc.description.sponsorship | Universidad del Norte through the Direccion de Investigaciones, Desarrollo e Innovacion (DIDI) | |
dc.description.status | pub | |
dc.eprint.id | https://eprints.ucm.es/id/eprint/17435 | |
dc.identifier.doi | 10.1155/2012/818054 | |
dc.identifier.issn | 1550-1329 | |
dc.identifier.officialurl | http://www.hindawi.com/journals/ijdsn/2012/818054/abs/ | |
dc.identifier.relatedurl | http://www.hindawi.com/ | |
dc.identifier.uri | https://hdl.handle.net/20.500.14352/42442 | |
dc.journal.title | International Journal of Distributed Sensor Networks | |
dc.language.iso | eng | |
dc.publisher | Hindawi | |
dc.relation.projectID | A1/037528/11 | |
dc.relation.projectID | 121545221101 | |
dc.rights.accessRights | open access | |
dc.subject.cdu | 004 | |
dc.subject.keyword | Autoconfiguration | |
dc.subject.keyword | protocol | |
dc.subject.keyword | trust | |
dc.subject.keyword | manet | |
dc.subject.ucm | Informática (Informática) | |
dc.subject.unesco | 1203.17 Informática | |
dc.title | Security Issues in Mobile Ad Hoc Networks | |
dc.type | journal article | |
dc.volume.number | 2012 | |
dcterms.references | T. Clausen and P. Jacquet, “Optimized Link State Routing Protocol (OLSR),” RFC 3626, Internet Engineering Task Force, 2003. D. Jonson, Y.Hu, and D.Maltz, “The Dynamic Source Routing Protocol (DSR) for mobile Ad Hoc networks for IPv4,” RFC 4728, Internet Engineering Task Force, 2007. C. E. Perkins, E. M. Belding-Royer, and S. Das, “Ad Hoc On-Demand Distance Vector (AODV) routing,” RFC 3561, Internet Engineering Task Force, 2003. R. Ogier, F. Templin, and M. Lewis, “Topology Dissemination Based on Reverse-Path Forwarding (TBRPF),” RFC 3684, Internet Engineering Task Force, 2004. Y.-C. Hu, D. B. Johnson, and A. Perrig, “SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks,” Ad Hoc Networks, vol. 1, no. 1, pp. 175–192, 2003. S. Gupte and M. Singhal, “Secure routing in mobile wireless ad hoc networks,” Ad Hoc Networks, vol. 1, no. 1, pp. 151–174, 2003. H. Deng, W. Li, and D. P. Agrawal, “Routing security in wireless ad hoc networks,” IEEE Communications Magazine, vol. 40, no. 10, pp. 70–75, 2002. L. J. García Villalba, J. García Matesanz, D. Ruperez Cañas, and A. L. García Matesanz, “Secure extension to the optimised link state routing protocol,” IET Information Security, vol. 5, no. 3, pp. 163–169, 2011. L. J. García Villalba, J. García Matesanz, A. L. S. Orozco, and J. D. Márquez Dıaz, “Auto-configuration protocols in mobile ad hoc networks,” Sensors, vol. 11, no. 4, pp. 3652–3666, 2011. L. J. García Villalba, J. García Matesanz, A. L. García Matesanz, and J. D. Márquez Dıaz, “Distributed Dynamic Host Configuration Protocol (D2HCP),” Sensors, vol. 11, no. 4, pp. 4438–4461, 2011. P. Wang, D. S. Reeves, and P. Ning, “Secure address autoconfiguration for mobile ad hoc networks,” in Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems-Networking and Services (MobiQuitous ’05), pp. 519–521, July 2005. F. Buiati, R. Puttini, R. de Sousa Jr., C. J. Barenco Abbas, and L. J. García Villalba, Authentication and autoconfiguration for MANET nodes,” in Proceedings of the 2nd International Conference on Embedded and Ubiquitous Computing (EUC ’04), pp. 41–52, 2004. A. Abdelmalek, M. Feham, and A. Taleb-Ahmed, “On Recent Security Enhancements to Autoconfiguration Protocols for MANETs Real threats and requirements,” International Journal of Computer Science and Network Security, vol. 9, no. 4, pp. 401–407, 2009. A. Misra, S. Das, A. McAuley, and S. K. Das, “Autoconfiguration, registration, and mobility management for pervasive computing,” IEEE Personal Communications, vol. 8, no. 4, pp. 24–31, 2001. M.Mohsin and R. Prakash, “IP address assignment in a mobile ad hoc network,” in Proceedings of the Global Information GRID—Enabling Transformation through 21st Century Communications (MILCOM ’02), pp. 856–861, Anaheim, Calif, USA, October 2002. R. S. Puttini, J. Marc Percher, L. M. M´e et al., “A Modular Architecture for Distributed IDS in MANET,” in Proceedings of the International Conference on Computational Science and Its Applications: Part III, pp. 91–113, Montreal, Canada, May 2003. A. Cavalli and J.-M. Orset, “Secure hosts auto-configuration in mobile Ad hoc networks,” in Proceedings of the 24th International Conference on Distributed Computing Systems Workshops, pp. 809–814, Hachioji, Tokyo, March 2004. S. Hu and C. Mitchell, “Improving IP address autoconfiguration security in manets using trust modelling,” in Proceedings of the 1st International Conference on Mobile Ad-Hoc and Sensor Networks, vol. 3794 of Lecture Notes in Computer Science (LNCS), pp. 83–92,Wuhan, China, December 2005. C. Huang, H. P. Hu, and Z. Wang, “Modeling time-related trust,” in Proceedings of the Grid and Cooperative Computing Workshops, vol. 3252 of Lecture Notes in Computer Science (LNCS), pp. 382–389, October 2004. A. A. Pirzada and C. McDonald, “Establishing trust in pure Ad-Hoc networks,” in Proceedings of the 27th Australasian Conference on Computer Science, pp. 47–54, Dunedin, New Zealand, 2004. M. Taghiloo, M. Dehghan, J. Taghiloo, and M. Fazio, “New approach for address auto-configuration in MANET based on virtual address space mapping (VASM),” in Proceedings of the 3rd International Conference on Information and Communication Technologies: FromTheory to Applications (ICTTA ’08), pp. 1–6, Damascus, Syria, April 2008. M. Tajamolian,M. Taghiloo, and M. Tajamolian, “Lightweight secure IP address auto-configuration based on VASM,” in Proceedings of the International Conference on Advanced Information Networking and Applications Workshops (WAINA ’09), pp. 176–180, May 2009. H. Zhou, M. W. Mutak, and L. M. Ni, “Secure autoconfiguration and public-key distribution for mobile ad-hoc networks,” in Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS ’09), pp. 256–263, Macau, China, October | |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | dea44425-99a5-4fef-b005-52d0713d0e0d | |
relation.isAuthorOfPublication | 2edb0904-329e-4db5-87dc-348fb754d4d9 | |
relation.isAuthorOfPublication | 0f67f6b3-4d2f-4545-90e1-95b8d9f3e1f0 | |
relation.isAuthorOfPublication.latestForDiscovery | dea44425-99a5-4fef-b005-52d0713d0e0d |
Download
Original bundle
1 - 1 of 1