Rushing attack against routing protocols in Mobile Ad-Hoc Networks

Because of the nature of wireless channels, Mobile Ad-Hoc Networks (MANETs) are vulnerable against many threats and attacks. Beside of this, the mobility of the network nodes made the security of routing protocols one of the most interesting research areas over Ad-Hoc networks. Moreover, Rushing attack became one of the common attacks against routing protocols in MANETs. Although there are many researches over Rushing attacks, the security research community suffers from a famine of evidence to present the exact position of this kind of attacks in MANETs clearly. Therefore, we paid particular attention to this issue to clarify the position of Rushing attacks against routing protocols and the functionality of this category of attacks. We hope that our document be useful for other researchers in understanding mentioned issue in face with this class of attacks.

[2]  Jorjeta G. Jetcheva,et al.  Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks , 2001, MobiHoc '01.

[3]  Lixia Zhang,et al.  Forwarding Group Multicast Protocol (FGMP) for multihop, mobile wireless networks , 1998, Cluster Computing.

[4]  Shih-Lin Wu,et al.  Wireless Ad Hoc Networking : Personal-Area, Local-Area, and the Sensory-Area Networks , 2007 .

[5]  Johann van der Merwe,et al.  A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.

[6]  Jie Wu,et al.  Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[7]  V. Palanisamy,et al.  Impact of Rushing attack on Multicast in Mobile Ad Hoc Network , 2009, ArXiv.

[8]  Zygmunt J. Haas,et al.  On the performance of a routing protocol for the reconfigurable wireless network , 1998, VTC '98. 48th IEEE Vehicular Technology Conference. Pathway to Global Wireless Revolution (Cat. No.98CH36151).

[9]  Nabendu Chaki,et al.  Routing Misbehavior in Ad Hoc Network , 2010 .

[10]  Zygmunt J. Haas,et al.  A new routing protocol for the reconfigurable wireless networks , 1997, Proceedings of ICUPC 97 - 6th International Conference on Universal Personal Communications.

[11]  Charles E. Perkins,et al.  Multicast operation of the ad-hoc on-demand distance vector routing protocol , 1999, MobiCom.

[12]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[13]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[14]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[15]  Öznur Özkasap,et al.  Ad-Hoc Networks , 2008, Encyclopedia of Algorithms.

[16]  Ajit Singh,et al.  A Literature Review of Security Attack in Mobile Ad-hoc Networks , 2010 .

[17]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[18]  Silvia Giordano,et al.  Mobile ad hoc networks , 2002 .

[19]  J.J. Garcia-Luna-Aceves,et al.  Wireless internet gateways (WINGs) , 1997, MILCOM 97 MILCOM 97 Proceedings.

[20]  Rajendra V. Boppana,et al.  An adaptive distance vector routing algorithm for mobile, ad hoc networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).