Secure node misbehaviors in mobile ad hoc networks

被引:0
|
作者
Chigan, CX [1 ]
Bandaru, R [1 ]
机构
[1] Michigan Technol Univ, Dept Elect & Comp Engn, Houghton, MI 49931 USA
关键词
MANET; AODV; SAODV; security; insider attack; node misbehavior; wormhole attack;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Node misbehaviors are serious attacks for routing protocols in Mobile Ad Hoc Networks (MANET). In this paper, two types of node misbehaviors, single intermediate node packet dropping and group nodes wormhole attacks, are exclusively identified for the Secure Ad Hoc On-demand Distance Vector Routing protocol (SAODV). The countermeasures are proposed to protect against these node misbehaviors, and therefore further enhance the security of SAODV, such that a near perfect secure routing protocol is achieved. To protect SAODV against any form of single insider attacks, we assign the task of single malicious intermediate nodes detection and isolation to a group of nodes since there is no centralized authority in ad hoc networks. These nodes lie around active paths in MANET. Nodes use the same digital signatures that are used for routing in SAODV to provide authentication and integrity protection for routing information. For wormhole attack, in which more than one malicious nodes work in group, a novel mechanism without time synchronization or location information techniques to detect this attack is proposed. Our simulation results show the network performance degradation after incorporating the above two mechanisms in SAODV is negligible.
引用
收藏
页码:4730 / 4734
页数:5
相关论文
共 50 条
  • [11] A secure incentive protocol for mobile ad hoc networks
    Zhang, Yanchao
    Lou, Wenjing
    Liu, Wei
    Fang, Yuguang
    WIRELESS NETWORKS, 2007, 13 (05) : 569 - 582
  • [12] A confident community to secure Mobile Ad hoc Networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    Guang, Lei
    Assi, Chadi
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1254 - +
  • [13] A secure routing protocol for mobile ad hoc networks
    Du, D. (orchid_ee@sina.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [14] Designing secure wireless mobile ad hoc networks
    Balakrishnan, V
    Varadharajan, V
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 5 - 8
  • [15] Secure multipath routing for mobile ad hoc networks
    Kotzanikolaou, P
    Mavropodi, R
    Douligeris, C
    SECOND ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES, PROCEEDINGS, 2005, : 89 - 96
  • [16] A secure and decentralised SIP for mobile ad hoc networks
    Hussain, Mohammed
    Ben Khedher, Dhafer
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2018, 20 (01) : 1 - 15
  • [17] A secure incentive protocol for mobile ad hoc networks
    Yanchao Zhang
    Wenjing Lou
    Wei Liu
    Yuguang Fang
    Wireless Networks, 2007, 13 : 569 - 582
  • [18] Secure and anonymous mobile ad-hoc networks
    Mu, Y
    Zhang, FG
    Susilo, W
    2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 1132 - 1136
  • [19] Secure Key Distribution for Mobile Ad Hoc Networks
    Dawoud, Dawoud S.
    Auxeeliya, Jesudoss
    IMETI 2010: 3RD INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II (POST-CONFERENCE EDITION), 2010, : 326 - 331
  • [20] Secure multipath communication in mobile ad hoc networks
    Burmester, M
    Van Le, T
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 405 - 409