Collaborative Techniques for Detecting Wormhole Attack in MANETs

Publish Year: 1390
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,661

This Paper With 7 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ISCEE14_273

تاریخ نمایه سازی: 31 مرداد 1390

Abstract:

In this paper, first the concept of wormhole attack and five kinds of this attack and clusters are introduced. After that two intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood are explained. The first technique is designed for detection of malicious nodes in a neighborhood of nodes in which each pair of nodes in the neighborhood is within radio range of each other. The second technique is designed for detection of malicious nodes in a neighborhood of nodes, in which each pair of nodes may not be in radio range of each other but where there is a node among them which has all the other nodes in its one-hop vicinity. Both techniques use message passing between the nodes. A node called the monitor node initiates the detection process. Based on the messages that it receives during the detection process, each node determines the nodes it suspects to be malicious and send votes to the monitor node. The monitor node upon inspecting the votes determines the malicious nodes from among the suspected nodes. Defect of these techniques is the impossibility of detecting wormhole attack in the form of out of band attack so in this paper we complete these techniques to give the ability of detecting wormhole attack and isolating them from routing process.

Keywords:

Mobile ad-hoc networks (MANET) , Wormhole attack , Cluster , clique , Monitor node

Authors

M Nouri

Department of Electrical Engineering, University of Science & Technology

S Abazari Aghdam

Islamic Azad university south Tehran branch, Tehran, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • V. Varadharajan, R. Shankaran, M. Hitchens, Security for cluster based ...
  • P. Papadimitratos, Z. Haas, "Secure routing for mobile ad hoc ...
  • theoretic approach, " Proceedings of IEEE Wireless Communica- _ _ ...
  • C.E. Perkins, E.M. Royer, _ hoc on-demand distance vector routing, ...
  • K. Sanzgiri, B. Dahill, B.N. Levine, , Shields, E. Belding ...
  • proved technique upon the minimum number of mali- [2] _ ...
  • algorithm specifies for amount of k o detect wormhole [8] ...
  • _ Student Conference on Electrical Engineering Kermanshah University of Technology, ...
  • B. Bellur, R.G. Ogier, A reliable, :efficient topology broadcast for ...
  • _ _ _ : _ _ University. ...
  • _ _ _ [20] _ _ ings of ACM SIGCOMM ...
  • _ _ _ _ and Communication Security (CCS'03), 2003 ...
  • P. Papadimitratos, Z. Haas, :Secure routing for mobile ad hoc ...
  • نمایش کامل مراجع