Skip to main content
Log in

Methods of protecting self-organizing networks against attacks on traffic routing

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

The security of wireless self-organized networks has been considered. A “black hole” attack aimed at violating the operability of these networks has been explored and analyzed. Recommendations on defending against such an attack have been made.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Moskvin, D.A. and Ivanov, D.V., The study of security of self-organizing wireless networks, Zh. Inf. Bezop., 2014.

    Google Scholar 

  2. Kucheryavyi, A.E., Prokop’ev, A.V., and Kucheryavyi, E.A., Self-Organizing Networks, St. Petersburg: Lyubavich, 2011.

    Google Scholar 

  3. Shree Om, M.T., Wireless ad-hoc network under black-hole attack, Int. J. Digital Inf. Wireless Commun., pp. 591–596.

  4. The Internet Engineering Task Force. http://www.ietf.org/rfc/rfc3561.txt. Cited May 10, 2014.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. A. Moskvin.

Additional information

Original Russian Text © D.A. Moskvin, D.V. Ivanov, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Moskvin, D.A., Ivanov, D.V. Methods of protecting self-organizing networks against attacks on traffic routing. Aut. Control Comp. Sci. 49, 745–750 (2015). https://doi.org/10.3103/S0146411615080118

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411615080118

Keywords

Navigation