Title :
Locating the Attacker of Wormhole Attack by Using the Honeypot
Author :
Keerthi, T. Divya Sai ; Venkataram, Pallapa
Author_Institution :
Electr. Commun. Eng. Dept., Indian Inst. of Sci., Bangalore, India
Abstract :
Mobile Ad hoc Networks (MANETs) having strikingly superior features also come with notable disadvantage and troubles and the most exigent amongst all being security related issues. Such an ringent network dexterously pave approach for the malicious nodes. Hence providing security is a tedious task. For such a dynamic environment, a security system which dynamically observes the attacker´s plans and protect the highly sophisticated resources is in high demand. In this paper we present a method of providing security against wormhole attacks to a MANET by learning about the environment dynamically and adapting itself to avoid malicious nodes. We accomplish this with the assistance of Honeypot. Our method predicts the wormhole attack that may take place and protect the resources well-in advance. Also it cleverly deal with the attacker by using previous history and different type of messages to locate the attacker. Several experiments suggest that the system is accurate in handling wormhole attack.
Keywords :
mobile ad hoc networks; security of data; Honeypot; MANET; malicious nodes; mobile ad hoc networks; ringent network; wormhole attack attacker; Ad hoc networks; Databases; Delay; History; Mobile computing; Routing protocols; Security; Attacker trace-back; History database; Honeypots; Mobile ad hoc networks; Security;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
DOI :
10.1109/TrustCom.2012.196