Secure node misbehaviors in mobile ad hoc networks

被引:0
|
作者
Chigan, CX [1 ]
Bandaru, R [1 ]
机构
[1] Michigan Technol Univ, Dept Elect & Comp Engn, Houghton, MI 49931 USA
关键词
MANET; AODV; SAODV; security; insider attack; node misbehavior; wormhole attack;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Node misbehaviors are serious attacks for routing protocols in Mobile Ad Hoc Networks (MANET). In this paper, two types of node misbehaviors, single intermediate node packet dropping and group nodes wormhole attacks, are exclusively identified for the Secure Ad Hoc On-demand Distance Vector Routing protocol (SAODV). The countermeasures are proposed to protect against these node misbehaviors, and therefore further enhance the security of SAODV, such that a near perfect secure routing protocol is achieved. To protect SAODV against any form of single insider attacks, we assign the task of single malicious intermediate nodes detection and isolation to a group of nodes since there is no centralized authority in ad hoc networks. These nodes lie around active paths in MANET. Nodes use the same digital signatures that are used for routing in SAODV to provide authentication and integrity protection for routing information. For wormhole attack, in which more than one malicious nodes work in group, a novel mechanism without time synchronization or location information techniques to detect this attack is proposed. Our simulation results show the network performance degradation after incorporating the above two mechanisms in SAODV is negligible.
引用
收藏
页码:4730 / 4734
页数:5
相关论文
共 50 条
  • [21] Advanced Secure Routing in Ad hoc mobile networks
    Padmadas, M.
    Krishnan, N.
    Sasidharan, Sithara
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 821 - 824
  • [22] A secure routing protocol for mobile Ad hoc networks
    Li, Zhitang
    Shi, Shudong
    6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 153 - +
  • [23] Mitigating routing misbehaviors using subjective trust model in mobile ad hoc networks
    Vasantha, V.
    Manimegalai, D.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 418 - 423
  • [24] Trust Evaluation Method Adapted to Node Behavior for Secure Routing in Mobile Ad hoc Networks
    Umeda, Sayaka
    Takeda, Sonoko
    Shigeno, Hiroshi
    2015 EIGHTH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND UBIQUITOUS NETWORKING (ICMU), 2015, : 143 - 148
  • [25] Stimulating Node Cooperation in Mobile Ad hoc Networks
    Jamal N. Al-Karaki
    Ahmed E. Kamal
    Wireless Personal Communications, 2008, 44 : 219 - 239
  • [26] Multifold node authentication in mobile ad hoc networks
    Komninos, Nikos
    Vergados, Dimitrios D.
    Douligeris, Christos
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2007, 20 (12) : 1391 - 1406
  • [27] Enhancement of node connectivity for mobile ad hoc networks
    Shi, Xiyu
    Li, Fanzhi
    Adams, Christopher
    MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS, 2006, 6250
  • [28] Reliable Node Clustering for Mobile Ad Hoc Networks
    Wang, Tao
    Hung, William N. N.
    JOURNAL OF APPLIED MATHEMATICS, 2013,
  • [29] Stimulating node cooperation in mobile ad hoc networks
    Al-Karaki, Jamal N.
    Kamal, Ahmed E.
    WIRELESS PERSONAL COMMUNICATIONS, 2008, 44 (02) : 219 - 239
  • [30] Secure Node Discovery in Ad-hoc Networks and Applications
    Di Crescenzo, Giovanni
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 171 (01) : 43 - 55