Back to Results
First PageMeta Content
Computing / Routing / Dynamic Source Routing / B.A.T.M.A.N. / Wireless networking / Network architecture / Ad hoc On-Demand Distance Vector Routing


How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols 1,2 Peng Ning and Kun Sun Cyber Defense Laboratory, Computer Science Department, North Carolina State University, Raleigh, NC 27
Add to Reading List

Document Date: 2011-11-09 13:25:59


Open Document

File Size: 289,75 KB

Share Result on Facebook

City

RREQ / /

Company

Ad Hoc Networks / Kun Sun Cyber Defense Laboratory / /

/

Event

FDA Phase / /

Facility

North Carolina State University / /

IndustryTerm

on-demand routing protocol / mobile ad-hoc networks / secure and efficient routing protocols / wireless ad-hoc network / secure ad-hoc routing protocols / vulnerability analysis tools / stateless protocol / security services / less powerful computing resources / tamper-proof hardware / mobile ad-hoc routing protocols / wireless communication / ad-hoc routing protocols / typical mobile ad-hoc network / ad-hoc network / be derived automatically using vulnerability analysis tools / /

Organization

Army Research Office / North Carolina State University / Raleigh / RREQ MF / /

Position

forward / or actively forge RREQ messages / Forward / /

Product

Some compound / AODV / /

ProgrammingLanguage

Hoc / /

ProvinceOrState

North Carolina / /

Technology

cryptography / routing protocol / AODV protocol / mobile ad-hoc routing protocols / stateless protocol / The AODV Protocol The AODV protocol / secure ad-hoc routing protocols / simulation / IPsec Authentication Header protocol / on-demand routing protocol / ad-hoc routing protocols / /

SocialTag