Title :
Collaborative techniques for detecting wormhole attack in MANETs
Author :
Nouri, Mahdi ; Aghdam, Somayeh Abazari ; Aghdam, Sajjad Abazari
Author_Institution :
Dept. of Electr. Eng., Univ. of Sci. & Technol., Tehran, Iran
Abstract :
In this paper, first the concept of wormhole attack and five kinds of this attack and clusters are introduced. After that two intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood are explained. The first technique is designed for detection of malicious nodes in a neighborhood of nodes in which each pair of nodes in the neighborhood is within radio range of each other. The second technique is designed for detection of malicious nodes in a neighborhood of nodes, in which each pair of nodes may not be in radio range of each other but where there is a node among them which has all the other nodes in its one-hop vicinity. Both techniques use message passing between the nodes. A node called the monitor node initiates the detection process. Based on the messages that it receives during the detection process, each node determines the nodes it suspects to be malicious and send votes to the monitor node. The monitor node upon inspecting the votes determines the malicious nodes from among the suspected nodes. Defect of these techniques is the impossibility of detecting wormhole attack in the form of out of band attack so in this paper we complete these techniques to give the ability of detecting wormhole attack and isolating them from routing process.
Keywords :
message passing; mobile ad hoc networks; security of data; telecommunication network routing; MANET; collaborative techniques; intrusion detection; malicious node detection; message passing; mobile ad hoc networks; one-hop vicinity; radio range; routing process; suspected nodes; wormhole attack detection; Ad hoc networks; Clustering algorithms; Mobile computing; Monitoring; Relays; Routing; Routing protocols; Cluster; Monitor node; Wormhole attack; clique; insert Mobile ad-hoc networks (MANET);
Conference_Titel :
Research and Innovation in Information Systems (ICRIIS), 2011 International Conference on
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-61284-295-0
DOI :
10.1109/ICRIIS.2011.6125695