{"title":"移动自组网中黑洞攻击防御的协同安全架构","authors":"A. Patcha, Amitabh Mishra","doi":"10.1109/RAWCON.2003.1227896","DOIUrl":null,"url":null,"abstract":"An ad hoc network is a group of wireless mobile computers (or nodes) wherein individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. The Black hole attack is an important problem that could happen easily in ad hoc networks especially in popular on-demand protocols like the ad hoc on-demand distance vector routing (AODV). Prior research in ad hoc networking has generally looked into the routing problem in a non-adversarial network setting, assuming a reasonably trusted environment. This paper proposes a collaborative architecture to detect and exclude malicious nodes that act in groups or alone. The focus is on the network layer, using the ad hoc on-demand distance vector routing (AODV) protocol as an example. This paper describes an extension to the watchdog method to incorporate a collaborative architecture to tackle collusion among nodes.","PeriodicalId":177645,"journal":{"name":"Radio and Wireless Conference, 2003. RAWCON '03. Proceedings","volume":"125 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"163","resultStr":"{\"title\":\"Collaborative security architecture for black hole attack prevention in mobile ad hoc networks\",\"authors\":\"A. Patcha, Amitabh Mishra\",\"doi\":\"10.1109/RAWCON.2003.1227896\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An ad hoc network is a group of wireless mobile computers (or nodes) wherein individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. The Black hole attack is an important problem that could happen easily in ad hoc networks especially in popular on-demand protocols like the ad hoc on-demand distance vector routing (AODV). Prior research in ad hoc networking has generally looked into the routing problem in a non-adversarial network setting, assuming a reasonably trusted environment. This paper proposes a collaborative architecture to detect and exclude malicious nodes that act in groups or alone. The focus is on the network layer, using the ad hoc on-demand distance vector routing (AODV) protocol as an example. This paper describes an extension to the watchdog method to incorporate a collaborative architecture to tackle collusion among nodes.\",\"PeriodicalId\":177645,\"journal\":{\"name\":\"Radio and Wireless Conference, 2003. RAWCON '03. Proceedings\",\"volume\":\"125 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-09-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"163\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Radio and Wireless Conference, 2003. RAWCON '03. Proceedings\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RAWCON.2003.1227896\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Radio and Wireless Conference, 2003. RAWCON '03. Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RAWCON.2003.1227896","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Collaborative security architecture for black hole attack prevention in mobile ad hoc networks
An ad hoc network is a group of wireless mobile computers (or nodes) wherein individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. The Black hole attack is an important problem that could happen easily in ad hoc networks especially in popular on-demand protocols like the ad hoc on-demand distance vector routing (AODV). Prior research in ad hoc networking has generally looked into the routing problem in a non-adversarial network setting, assuming a reasonably trusted environment. This paper proposes a collaborative architecture to detect and exclude malicious nodes that act in groups or alone. The focus is on the network layer, using the ad hoc on-demand distance vector routing (AODV) protocol as an example. This paper describes an extension to the watchdog method to incorporate a collaborative architecture to tackle collusion among nodes.