Contents & References of Evaluation of security of routing protocols in ad hoc networks against worm tunnel attack
List:
17
1-4 Tunnelworm attacks and its types 18
Chapter Two: Routing protocols of case networks
2-1 Classification of routing protocols 25
2-1-1 Active protocols 25
2-1-2 Reactive protocols 25
2-2 Protocol Flood 25
2-3 DSR protocol 25
2-4 AODV protocol 26
2-5 LAR protocol 26
2-6 Comparison of LAR, DSR, AODV protocols 27
2-7 Improving routing security in ad hoc networks 28
2-7-1 ARAN protocol 28
2-7-2 ARIADNE protocol 28
2-7-3 SRP protocol 29
2-7-4 SAODV protocol 29
Chapter three: Studies conducted to detect and deal with tunnel worm attack
3-1 WARP31 protocol
3-1-1 Comparison WARP protocol with AODV31 protocol 3-1-2 Advantages of WARP 33 protocol 3-2 DELPHI33 protocol 3-2-1 Advantages of DELPHI 36 protocol 3-3 ADCLI and ADCLU37 protocols 3-3-1 ADCLI37 protocol 3-3-2 ADCLU38 protocol
3-4 WAP39 protocol
3-5 protocol presented by Mahajan 42
3-6 protocol presented by F.N. Abdosselam42
3-7 protocol provided by Khinsandarwin43
3-8 protocol provided by HVU43
3-9 protocol PACKET LEASHES44
3-9-1 definition of LEASH44
3-9-2 types of LEASH44
3-10 protocol provided by Marianne A.Azer46
3-10-1 Advantages48
3-11 WHOP48 protocol
3-11-1 Comparison of WHOP protocol and DELPHI protocol 51
3-12 The protocol proposed by Xia Wang51
3-12-1 EDWA51 main design
3-13 Analysis and statistical analysis53
3-14 Directional antennas54
3-15 Link-mode routing protocol or OLSR54
3-15-1 Routing messages in OLSR55
3-15-2 MPR56 selection
Chapter four: Simulation of tunnelworm countering protocols
4-1 NS260 simulator installation
4-2 Tunnelworm 61 attack protocol
4-3 Tunnelworm65 protocol emulation
4-4 WARP72 protocol
4-5 RREQ processing in WARP75 protocol
4-6 RREP processing in WARP76 protocol
4-7 Processing RREP-DEC in WARP77 protocol
4-8 Sending PACKET in WARP78 protocol
4-9 Simulation of WARP protocol to deal with tunnel worm attack 79
4-10 Simulation of OLSR84 protocol
4-11 Overhead of OLSR97 protocol
4-12 Advantages of OLSR97 protocol
Chapter five: Evaluation
5-1 evaluation of throughput and delay 97
Chapter six: conclusions and suggestions
6-1 conclusion 109
6-2 suggestions 109
6-3 future work 109
resources..110
appendix..115
Source:
[1] Prayag Narula, Sanjay Kumar Dhurandher, Sudip Misra, Isaac Woungang. "Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing", in computer communication 31, 2008, pp 760-769
[2] A.A.A. Radwan, T.M. Mahmoud, E.H. Hussein. "Evaluation comparison of some ad hoc networks routing protocols", 12th Egyption Informatics Journal, 2011, pp 95-106
[3] Hoang Lan Nguyen, uyon Trang Nguyen,"A study of different types of attacks on multicast in mobile ad hoc networks", in ad hoc networks volume 6, issue 1, January 2008
[4] Mahdi Nouri, Somayeh Abazari Aghdam, Sajjad Abazari Aghdam. "Collaborative Techniques for Detecting Wormhole Attack in MANETs". "Defending against wormhole attacks in mobile ad hoc networks", in wireless communication and mobile computing, vol 6, pp 483-502, 2006
[7] Luis"Defending against wormhole attacks in mobile ad hoc networks", in wireless communication and mobile computing, vol 6, pp 483-502, 2006
[7] Luis Fernando Garcia and Jean-Marc Robert. "Preventing Layer-3 wormhole attacks in ad hoc networks with multiple DSR", in the 8th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2009, pp 15-20
[8] Lang D. "evaluation and classification of routing protocols for mobile ad hoc networks", PhD thesis, Fakultat fur Informatik der Technischen, Universitat Munchen, Germany, 2006.
[9] Mike Burmester, TriVanle, Alec Yasinsac. "Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks", in ad hoc networks2, 2004, 291-307
[10] Perkins CE, Royer EM, Das SR. "ad hoc on demand distance vector (AODV) routing". Available from: http://www.ietf.org/internetdrafts/draft-ietfmanet-aodv-06.txt,IETF Internet Draft, work in progress, 2000.
[11] Perkins C, Belding-Royer E, Das S. "Advanced on demand Distance vector (AODV) routing". Network working group, IEFT RFC, RFC 3561, 2003.
[12] BBlazevic L, Le Boudec I, Giordano S. “A location based routing method for irregular mobile ad hoc networks”, EPFL-IC Report Number IC/2003/30/2003.
[13] Ashtiani H, Alirezaee S, Mohsen mir hosseini S, Khosravi H. "NR: new position based routing algorithm for mobile ad hoc networks", in: proceedings of the world congress on engineering, UK, vol 1, 2009
[14] k.sanzgiri, D.Laflamme, B.Dahill, B.N. Levine, C. shields and E.M. Belding-Royer. "Authenticated Routing for ad hoc networks", IEEE Journal on selected Areas in Communication, special issue on wireless Ad Hoc networks, vol 23, no 3, pp 598-610, 2005.
[15] Y-C, Hu, A.Perrig, and D.B. Johnson. "Ariadne: A secure on-demand routing protocol for ad hoc networks", in wireless networks, vol 11, no 1-2, pp 21-38, 2005
[16] P.Papadimitratos and z.J. Haas, "Secure Routing for mobile ad hoc networks", SCS Communication Networks and Distributed systems Modeling and Simulation Conference(CNDS2002), San Antonio, TX, Jan 2002.
[17] Song baiLu, LongXuanLi, kwok-Yan Lam, Ling yan jia, "SAODV: A network routing protocol that can withstand Blackhole attack", international conference of computational intelligence and security, December 2009,421-425
[18] Ming-Yang Su, “WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks”, in computer&security 29, 2010, 208-224
[19] Chiu, HS; wong Lui, ks, "DelPHI: wormhole detection mechanism for ad hoc wireless networks" in the 1st international symposium on wireless pervasive computing, phuket, Thailand, 16-18 January 2006
[20] Sun choi, Doo-young kim, Do_hyeon Lee, Jae-il jung. "WAP: wormhole prevention Algorithm in Mobile ad hoc networks", in IEEE International Conference on sensor Networks, Ubiquitous, and Trustworthy computing, 2008, pp 343-348
[21] F.N Abdesselam. "Detecting and Avoiding wormhole attacks in wireless ad hoc networks", in IEEE communications Magazine, vol 64(4), pp 127-133, 2008
[22] Khinsandarwin. "Analysis of Detecting wormhole attack in wireless networks", in the world academy of science, engineering and technology, vol 36, 2008.
[23] H.VU. "WORMEROS: A New Framework for Defending against wormhole Attacks on wireless ad hoc networks", proc.Of Int'1 conf. on wireless algo. Systems and App1.,LNCS Vol,5258,pp 491-502,2008
[24] Yi_chun Hu, Adrian Perrig, David B.Johnson. "Packet leashes: A Defense against wormhole attacks in wireless networks", in IEEE conference, 2003, pp 1976-1986
[25] Marianne A. Azer, E1-kassas and Magdy s.E1-soudani. "An Innovative Approach for wormhole attack Detection and Prevention In wireless Ad Hoc Networks", IEEE 2010, pp 366-371
[26] Saurabh Gupta, subrat kar, S Dharmaraja. "WHOP: wormhole attack detection protocol using Hound Packet", in International Conference on Innovations in Information Technology", 2011, pp 226-231
[27] Xu su, Rajendra V.