{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:10:25Z","timestamp":1761621025953},"reference-count":38,"publisher":"Wiley","issue":"8","license":[{"start":{"date-parts":[[2010,1,13]],"date-time":"2010-01-13T00:00:00Z","timestamp":1263340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2011,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Topology graph based anomaly detection (TOGBAD) is a centralized approach to detect routing attacks in tactical multi\u2010hop networks. It uses anomaly detection based on topology graphs to identify attackers trying to launch routing attacks. Such attacks are a serious threat to multi\u2010hop networks since they may be used to disrupt, eavesdrop or manipulate the network. In this work, we present studies on the impact of an attacker launching a routing attack. Furthermore, we show a reasonable choice of attack parameters for the attacker. In our main contribution, we introduce TOGBAD and an evaluation of TOGBAD concerning its detection rate with and without packet loss. Finally, we illustrate TOGBAD's detection rate with an attacker trying to inure TOGBAD's anomaly detection to his attack. Copyright \u00a9 2010 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.185","type":"journal-article","created":{"date-parts":[[2010,1,13]],"date-time":"2010-01-13T08:48:50Z","timestamp":1263372530000},"page":"793-806","source":"Crossref","is-referenced-by-count":6,"title":["TOGBAD\u2014an approach to detect routing attacks in tactical environments"],"prefix":"10.1002","volume":"4","author":[{"given":"Elmar","family":"Gerhards\u2010Padilla","sequence":"first","affiliation":[]},{"given":"Nils","family":"Aschenbruck","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Martini","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2011,7,15]]},"reference":[{"key":"e_1_2_8_2_2","doi-asserted-by":"crossref","unstructured":"Gerhards\u2010PadillaE AschenbruckN MartiniP.Enhancements on and Evaluation of TOGBAD in Tactical MANETS.Proceedings of the 27th Military Communication Conference (MILCOM) 2008.","DOI":"10.1109\/MILCOM.2008.4753191"},{"key":"e_1_2_8_3_2","doi-asserted-by":"crossref","unstructured":"Gerhards\u2010PadillaE AschenbruckN MartiniP JahnkeM T\u00f6lleJ.Detecting blackhole attacks in Tactical MANETs using topology graphs.Proceedings of the 3rd IEEE LCN Workshop on Network Security (WNS) 2007.","DOI":"10.1109\/LCN.2007.72"},{"key":"e_1_2_8_4_2","doi-asserted-by":"crossref","unstructured":"HubauxJ Butty\u00e1nL CapkunS.The Quest for Security in Mobile Ad Hoc Networks.Proceedings of the 2nd ACM International Symposium on Mobile ad hoc Networking & Computing (MobiHOC) 2001.","DOI":"10.1145\/501416.501437"},{"key":"e_1_2_8_5_2","doi-asserted-by":"crossref","unstructured":"HuY PerrigA JohnsonD.Ariadne: a secure on\u2010demand routing protocol for ad hoc networks.Proceedings of the 8th ACM International Conference on Mobile Computing and Networking 2002.","DOI":"10.1145\/570645.570648"},{"key":"e_1_2_8_6_2","unstructured":"JahnkeM T\u00f6lleJ.Bedrohungen gegen taktische mobile Adhoc\u2010Netzwerke (MANETs). FGAN\/FKIE Wachtberg Germany Tech. Rep. December 2005 appointed by the Federal Office for information management and information technology of the German Federal Armed Forces [in German]."},{"key":"e_1_2_8_7_2","unstructured":"MackerJ.IETF Draft Simplified Multicast Forwarding for MANET 2009. Available at:https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.ietf.org"},{"key":"e_1_2_8_8_2","doi-asserted-by":"crossref","unstructured":"ClausenT JacquetP.RFC 3626 Optimized Link State Routing Protocol (OLSR) 2003. Available at:https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.ietf.org","DOI":"10.17487\/rfc3626"},{"key":"e_1_2_8_9_2","unstructured":"ClausenT DearloveC DeanJ.IETF Draft MANET Neighborhood Discovery Protocol 2009. Available at:https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.ietf.org"},{"key":"e_1_2_8_10_2","unstructured":"ClausenT DearloveC JacquetP.IETF Draft The Optimized Link State Routing Protocol version 2 2009. Available at:https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.ietf.org"},{"key":"e_1_2_8_11_2","unstructured":"HongF HongL FuC.Secure OLSR.Proceedings of the 19th International Conference on Advanced Information Networking and Applications 2005."},{"key":"e_1_2_8_12_2","doi-asserted-by":"crossref","unstructured":"RaffoD AdjihC ClausenT M\u00fchlethalerP.An advanced signature system for OLSR.Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks 2004.","DOI":"10.1145\/1029102.1029106"},{"key":"e_1_2_8_13_2","unstructured":"RamaswamiS UpadhyayaS.Smart handling of colluding black hole Attacks in MANETs and wireless sensor networks using multipath routing.Proceedings of 7th IEEE Workshop on Information Assurance 2006."},{"key":"e_1_2_8_14_2","doi-asserted-by":"crossref","unstructured":"PerkinsC Belding\u2010RoyerE DasS.RFC 3561 Ad hoc On\u2010Demand Distance Vector (AODV) Routing 2003. Available at:https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.ietf.org","DOI":"10.17487\/rfc3561"},{"key":"e_1_2_8_15_2","unstructured":"ZapataM.IETF Draft Secure Ad hoc On\u2010Demand Distance Vector (SAODV) Routing 2006. Available at:https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.ietf.org"},{"key":"e_1_2_8_16_2","unstructured":"HuY JohnsonD PerrigA.SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks.Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications(WMCSA) 2002."},{"key":"e_1_2_8_17_2","doi-asserted-by":"crossref","unstructured":"BrochJ MaltzD JohnsonD HuY JetchevaJ.A performance comparison of multi\u2010hop wireless ad hoc network routing protocols.Proceedings of the 4th ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom) 1998.","DOI":"10.1145\/288235.288256"},{"key":"e_1_2_8_18_2","doi-asserted-by":"crossref","unstructured":"AwerbuchB HolmerD Nita\u2010RotaruC RubensH.An on\u2010demand secure routing protocol resilient to byzantine Failures.Proceedings of the 3rd ACM Workshop on Wireless Security 2002.","DOI":"10.1145\/570681.570684"},{"key":"e_1_2_8_19_2","unstructured":"DengJ HanR MishraS.INSENS: intrusion\u2010tolerant routing in wireless sensor networks.Technical Report CU\u2010CS\u2010939\u201002 Department of Computer Science University of Colorado."},{"key":"e_1_2_8_20_2","unstructured":"LuB PoochU.Cooperative security\u2010enforcement routing in mobile ad hoc networks.Proceedings of the 4th International Workshop on Mobile and Wireless Communication Network 2002."},{"key":"e_1_2_8_21_2","doi-asserted-by":"crossref","unstructured":"PapadimitratosP HaasZ.Secure link state routing for mobile ad hoc networks.Proceedings of the IEEE Workshop on Security and Assurance in Ad hoc Networks 2003.","DOI":"10.1016\/S1570-8705(03)00018-0"},{"key":"e_1_2_8_22_2","unstructured":"AwerbuchB CurtmolaR HolmerD RubensH Nita\u2010RotaruC.An on\u2010demand secure routing protocol resilient to byzantine failures.Proceedings of the 1st IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks 2005."},{"key":"e_1_2_8_23_2","doi-asserted-by":"crossref","unstructured":"DengJ HanR MishraS.A performance evaluation of intrusion\u2010tolerant routing in wireless sensor networks.Proceedings of the 2nd IEEE International Workshop on Information Processing in Sensor Networks 2003.","DOI":"10.1007\/3-540-36978-3_23"},{"key":"e_1_2_8_24_2","unstructured":"JohnsonD HuY MaltzD.RFC 4728 The Dynamic Source Routing Protocol (DSR) 2007.https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.ietf.org"},{"key":"e_1_2_8_25_2","unstructured":"PerrigA CanettiR SongD TygarJ.Efficient and secure source authentication for multicast.Network and Distributed System Security Symposium 2001."},{"key":"e_1_2_8_26_2","unstructured":"PerrigA CanettiR TygarJ SongD.Efficient authentication and signing of multicast streams over lossy channels.IEEE Symposium on Security and Privacy 2000."},{"key":"e_1_2_8_27_2","unstructured":"PuttiniR de SousaR M\u00e9L.Combining certification\u2010based authentication and intrusion detection to secure Manet Routing Protocols.Proceedings of the 5th European Wireless Conference (Mobile and Wireless Systems beyond 3G) 2004."},{"key":"e_1_2_8_28_2","unstructured":"WangM LamontL MasonP GorlatovaM.An effective intrusion detection approach for OLSR MANET protocol.Proceedings of 1st IEEE ICNP Workshop on Secure Network Protocols 2005."},{"key":"e_1_2_8_29_2","doi-asserted-by":"crossref","unstructured":"KarglF SchlottS WeberP.Sensors for Detection of Misbehaving Nodes in MANETs.Praxis der Informationsverarbeitung und Kommunikation (PIK) 01\/2005 K.G. Saur Munich Germany 2005.","DOI":"10.1515\/PIKO.2005.38"},{"key":"e_1_2_8_30_2","unstructured":"KarglF.Sicherheit in Mobilen Ad hoc Netzwerken.Ph.D. Dissertation Universit\u00e4t Ulm 2003[in German]."},{"key":"e_1_2_8_31_2","unstructured":"McCanneS FloydS. ns Network Simulator 2006.https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.isi.edu\/nsnam\/ns\/"},{"key":"e_1_2_8_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/1096166.1096174"},{"key":"e_1_2_8_33_2","doi-asserted-by":"crossref","unstructured":"HongX GerlaM PeiG ChiangC.A group mobility model for ad hoc wireless networks.Proceedings of the 2nd ACM International Workshop on Modeling Ana\u2010 lysis and Simulation of Wireless and Mobile Systems 1999.","DOI":"10.1145\/313237.313248"},{"key":"e_1_2_8_34_2","unstructured":"BettstetterC WagnerC.The spatial node distribution of the random waypoint mobility model.Proceedings of the 1st German Workshop on Mobile Ad\u2010Hoc Networks (WMAN) 2002."},{"key":"e_1_2_8_35_2","doi-asserted-by":"crossref","unstructured":"YoonJ LiuM NobleB.Random waypoint considered harmful.Proceedings of 22nd IEEE Infocom 2003.","DOI":"10.1109\/INFCOM.2003.1208967"},{"key":"e_1_2_8_36_2","unstructured":"NATO Standardization Agency.The 1200 and 2400 Bit\/s NATO Interoperable Narrowband Voice Coder.STANAG 4591 2002."},{"key":"e_1_2_8_37_2","unstructured":"RappaportTS.Wireless Communications\u2014Principles & Practice. Prentice Hall Communications Engineering and Emerging Technologies Series: Prentice Hall Professional Technical Reference 1996."},{"key":"e_1_2_8_38_2","unstructured":"JahnkeM AschenbruckN Gerhards\u2010PadillaE et al.MITE\u2014MANET intrusion detection for tactical environments.Proceedings ot the RTO IST\u201022\u2010PBM Symposium 2008."},{"key":"e_1_2_8_39_2","unstructured":"Homepage of OpenVZ. OpenVZ 2009.https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/wiki.openvz.org\/Main_Page"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.185","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.185","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,7]],"date-time":"2023-10-07T12:31:23Z","timestamp":1696681883000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.185"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,15]]},"references-count":38,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2011,8]]}},"alternative-id":["10.1002\/sec.185"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1002\/sec.185","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7,15]]}}}