SURVEYING SECURITY ANALYSIS TECHNIQUES IN MANET ROUTING PROTOCOLS

被引:29
|
作者
Andel, Todd R. [1 ]
Yasinsac, Alec [1 ]
机构
[1] Florida State Univ, Tallahassee, FL 32306 USA
来源
关键词
D O I
10.1109/COMST.2007.4444751
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure routing protocols for mobile ad hoc networks are vital to proper wireless network operation. Unfortunately, ad hoc protocol security properties are often unknown and difficult to analyze. Non-exhaustive analysis techniques may deem a protocol secure, while in reality an unobvious or subtle flaw may be present. Using exhaustive analysis techniques to prove (or disprove) security properties increases protocol confidence. We provide a survey on the current state of analysis techniques, as they are used in the mobile ad hoc routing community and further discuss open research areas.
引用
收藏
页码:70 / 84
页数:15
相关论文
共 50 条
  • [2] Routing Protocols and Security Issues in MANET
    Kumar, Sandeep
    Goyal, Monika
    Goyal, Deepak
    Poonia, Ramesh C.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 818 - 824
  • [3] Performance Analysis of Security Attacks and Improvements of Routing Protocols in MANET
    Singh, Kuldeep
    Boparai, Amanat
    Handa, Vrinda
    Rani, Sudesh
    [J]. 2015 SECOND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE, COMPUTER ENGINEERING, AND SOCIAL MEDIA (CSCESM), 2015, : 163 - 169
  • [4] Privacy and Security on Anonymous Routing Protocols in MANET
    Kumari, E. Hemalatha Jai
    Kannammal, A.
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 431 - +
  • [5] A Comparative Performance Analysis of MANET Routing Protocols under Security Attacks
    Khan, Muhammad Saleem
    Jadoon, Qasim Khan
    Khan, Majid I.
    [J]. MOBILE AND WIRELESS TECHNOLOGY 2015, 2015, 310 : 137 - 145
  • [6] Trust Based Security in MANET Routing Protocols: A Survey
    Poonam
    Garg, K.
    Misra, M.
    [J]. PROCEEDINGS OF THE FIRST AMRITA ACM-W CELEBRATION OF WOMEN IN COMPUTING IN INDIA (A2WIC), 2010,
  • [7] Vulnerability Analysis and Security Framework (BeeSec) for Nature Inspired MANET Routing Protocols
    Mazhar, Nauman
    Farooq, Muddassar
    [J]. GECCO 2007: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOL 1 AND 2, 2007, : 102 - 109
  • [8] Security analysis of routing protocol for MANET
    Wang, Ying-long
    Wang, Ji-zhi
    Wang, Mei-qin
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, : 920 - 923
  • [9] Performance Analysis of Different MANET Routing Protocols
    Mukherjee, Srijan
    Mohapatra, Hitesh
    [J]. 2024 5TH INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY, ICITIIT 2024, 2024,
  • [10] Analysis of Multicast Routing Protocols for Secure Manet
    Maragatharajan, M.
    Balakannan, S. P.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING (INCOS), 2017,