{"title":"隐形节点攻击再次出现","authors":"Todd R. Andel, Alec Yasinsac","doi":"10.1109/SECON.2007.342988","DOIUrl":null,"url":null,"abstract":"Route security is vital to MANET operation and reliability. If a malicious host can inject itself into the routing path or alter the routing path, route security has failed. In this paper we focus on the invisible node attack (INA), an important, unsolved wireless network attack. We provide an INA formal definition and show why proposed solutions throughout the literature have not eliminated this critical attack. Since there is no existing INA solution, we provide a discussion on its potential impacts on ad hoc routing protocols.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":"{\"title\":\"The invisible node attack revisited\",\"authors\":\"Todd R. Andel, Alec Yasinsac\",\"doi\":\"10.1109/SECON.2007.342988\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Route security is vital to MANET operation and reliability. If a malicious host can inject itself into the routing path or alter the routing path, route security has failed. In this paper we focus on the invisible node attack (INA), an important, unsolved wireless network attack. We provide an INA formal definition and show why proposed solutions throughout the literature have not eliminated this critical attack. Since there is no existing INA solution, we provide a discussion on its potential impacts on ad hoc routing protocols.\",\"PeriodicalId\":423683,\"journal\":{\"name\":\"Proceedings 2007 IEEE SoutheastCon\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"18\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 2007 IEEE SoutheastCon\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECON.2007.342988\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 2007 IEEE SoutheastCon","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2007.342988","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Route security is vital to MANET operation and reliability. If a malicious host can inject itself into the routing path or alter the routing path, route security has failed. In this paper we focus on the invisible node attack (INA), an important, unsolved wireless network attack. We provide an INA formal definition and show why proposed solutions throughout the literature have not eliminated this critical attack. Since there is no existing INA solution, we provide a discussion on its potential impacts on ad hoc routing protocols.