2012 IEEE International Conference on Communications (ICC) 2012
DOI: 10.1109/icc.2012.6364045
|View full text |Cite
|
Sign up to set email alerts
|

A novel mechanism to secure internal attacks in HWMP routing protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…As in every new approach, it is necessary to compare the OBTA approach with others existed in the litterature. Because OBTA is the first IP traceback solution implemented in the data link layer by modifying HWMP protocol, we choose another solution in security field named HWMP‐WATCHDOG, which can be compared with our solution as it works at the HWMP level. This solution is able to prevent an attack on the internal nodes and to exclude them from network operations.…”
Section: Simulation Procedures and Interpretations Of Resultsmentioning
confidence: 99%
“…As in every new approach, it is necessary to compare the OBTA approach with others existed in the litterature. Because OBTA is the first IP traceback solution implemented in the data link layer by modifying HWMP protocol, we choose another solution in security field named HWMP‐WATCHDOG, which can be compared with our solution as it works at the HWMP level. This solution is able to prevent an attack on the internal nodes and to exclude them from network operations.…”
Section: Simulation Procedures and Interpretations Of Resultsmentioning
confidence: 99%
“…RCMs have been widely studied in various fields of distributed networks to support secure and trustworthy communications and collaborations among participants [4][5][6][7][8][9][10][11][12].…”
Section: Related Workmentioning
confidence: 99%
“…Ben-Othman et al [8] presented a new mechanism called HWMP-Watchdog, which is a reputation model at the network layer that combines the benefits of HWMP and Watchdog techniques to detect and exclude malicious nodes during the path-selection process and protect against internal attacks in the HWMP Routing Protocol. Luo et al [9] proposed RFSTrust, a trust model based on fuzzy recommendation similarity to quantify and evaluate the trustworthiness of nodes at the network layer.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations