Detecting unauthorized and compromised nodes in mobile ad hoc networks

Komninos, N., Vergados, D. & Douligeris, C. (2007). Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks, 5, pp. 289-298. doi: 10.1016/j.adhoc.2005.11.005

Download (147kB) | Preview


Security of mobile ad-hoc networks (MANET) has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. In this paper, the security challenges in intrusion detection and authentication are identified and the different types of attacks are discussed. We propose a two-phase detection procedure of nodes that are not authorized for specific services and nodes that have been compromised during their operation in MANET. The detection framework is enabled with the main operations of ad-hoc networking, which are found at the link and network layers. The proposed framework is based on zero knowledge techniques, which are presented through proofs.

Item Type: Article
Uncontrolled Keywords: mobile ad-hoc networks, authentication, intrusion detection, compromised nodes
Subjects: Q Science > QA Mathematics > QA76 Computer software
Divisions: School of Informatics > Informatics and Interdisciplinary Centre for Information Leadership
School of Informatics > Centre for Software Reliability

Actions (login required)

View Item View Item


Downloads per month over past year

View more statistics