Detecting unauthorized and compromised nodes in mobile ad hoc networks

被引:34
作者
Komninos, Nikos [1 ]
Vergados, Dimitris [1 ]
Douligeris, Christos [2 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Samos 83200, Greece
[2] Univ Piraeus, Dept Informat, Piraeus 18534, Greece
关键词
Mobile ad hoc networks; Authentication; Intrusion detection; Compromised nodes;
D O I
10.1016/j.adhoc.2005.11.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security of mobile ad hoc networks (MANET) has become a more sophisticated problem than security in other networks. due to the open nature and the lack of infrastructure of such networks. In this paper, the security challenges in intrusion detection and authentication are identified and the different types of attacks are discussed. We propose a two-phase detection procedure of nodes that are not authorized for specific services and nodes that have been compromised during their operation in MANET. The detection framework is enabled with the main operations of ad hoc networking, which are found at the link and network layers. The proposed framework is based oil zero knowledge techniques, which are presented through proofs. (c) 2005 Elsevier B.V. All rights reserved.
引用
收藏
页码:289 / 298
页数:10
相关论文
共 30 条
[1]  
[Anonymous], P 2 ACM INT S MOB AD
[2]  
[Anonymous], 2002, PACKET LEASHES DEFEN
[3]  
[Anonymous], IEEE NETWORK MAGAZIN
[4]  
BLAZEVIC L, 2001, IEEE COMMUNICATI JUN, P166
[5]  
BO S, 2004, IEEE GLOB TEL C GLOB, V6, P3551
[6]  
BUTTYAN L, 2000, P 1 ACM INT S MOB AD
[7]  
CHLAMTAC CM, 2003, AD HOC NETW, V1, P13
[8]  
CHOUCHEN Y, 2004, IEEE INT C NETW SENS, V1, P456
[9]  
DECLEENE B, 2001, IEEE MIL COMM C MILC
[10]   DDoS attacks and defense mechanisms: classification and state-of-the-art [J].
Douligeris, C ;
Mitrokotsa, A .
COMPUTER NETWORKS, 2004, 44 (05) :643-666