Secure node misbehaviors in mobile ad hoc networks

被引:0
|
作者
Chigan, CX [1 ]
Bandaru, R [1 ]
机构
[1] Michigan Technol Univ, Dept Elect & Comp Engn, Houghton, MI 49931 USA
关键词
MANET; AODV; SAODV; security; insider attack; node misbehavior; wormhole attack;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Node misbehaviors are serious attacks for routing protocols in Mobile Ad Hoc Networks (MANET). In this paper, two types of node misbehaviors, single intermediate node packet dropping and group nodes wormhole attacks, are exclusively identified for the Secure Ad Hoc On-demand Distance Vector Routing protocol (SAODV). The countermeasures are proposed to protect against these node misbehaviors, and therefore further enhance the security of SAODV, such that a near perfect secure routing protocol is achieved. To protect SAODV against any form of single insider attacks, we assign the task of single malicious intermediate nodes detection and isolation to a group of nodes since there is no centralized authority in ad hoc networks. These nodes lie around active paths in MANET. Nodes use the same digital signatures that are used for routing in SAODV to provide authentication and integrity protection for routing information. For wormhole attack, in which more than one malicious nodes work in group, a novel mechanism without time synchronization or location information techniques to detect this attack is proposed. Our simulation results show the network performance degradation after incorporating the above two mechanisms in SAODV is negligible.
引用
收藏
页码:4730 / 4734
页数:5
相关论文
共 50 条
  • [1] On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures
    Xing, Fei
    Wang, Wenye
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (03) : 284 - 299
  • [2] Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks
    Kuriakose, Jeril
    Amruth, V.
    Raju, R. Vikram
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 402 - 411
  • [3] SECURE ROUTING FOR MOBILE AD HOC NETWORKS
    Argyroudis, Patroklos G.
    O'Mahony, Donal
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (03): : 2 - 21
  • [4] A secure architecture for mobile ad hoc networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 424 - +
  • [5] Secure routing for mobile Ad hoc networks
    Liu, Jing
    Fu, Fei
    Xiao, Junmo
    Lu, Yang
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 314 - +
  • [6] On the node cooperation in mobile ad hoc networks
    Al-Karaki, Jamal N.
    Bataineh, Sameer
    2006 10TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2006, : 61 - +
  • [7] Secure Localized node positioning in Mobile ad-hoc networks using PSO
    Subburaj, V
    Chitra, K.
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 295 - +
  • [8] A secure location service in mobile ad hoc networks
    Zhou, Z
    Yow, KC
    Nandi, S
    MOBILE AND WIRELESS COMMUNICATIONS NETWORKS, 2003, : 274 - 277
  • [9] Secure Routing Protocols for Mobile Ad Hoc Networks
    Moudni, Houda
    Er-rouidi, Mohamed
    Mouncif, Hicham
    El Hadadi, Benachir
    2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [10] Secure data communication in mobile ad hoc networks
    Papadimitratos, P
    Haas, ZJ
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 343 - 356