City Research Online

Detecting unauthorized and compromised nodes in mobile ad hoc networks

Komninos, N., Vergados, D. and Douligeris, C. (2007). Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks, 5, pp. 289-298. doi: 10.1016/j.adhoc.2005.11.005

Abstract

Security of mobile ad-hoc networks (MANET) has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. In this paper, the security challenges in intrusion detection and authentication are identified and the different types of attacks are discussed. We propose a two-phase detection procedure of nodes that are not authorized for specific services and nodes that have been compromised during their operation in MANET. The detection framework is enabled with the main operations of ad-hoc networking, which are found at the link and network layers. The proposed framework is based on zero knowledge techniques, which are presented through proofs.

Publication Type: Article
Publisher Keywords: mobile ad-hoc networks, authentication, intrusion detection, compromised nodes
Subjects: Q Science > QA Mathematics > QA76 Computer software
Departments: School of Mathematics, Computer Science & Engineering > Computer Science > Software Reliability
URI: http://openaccess.city.ac.uk/id/eprint/2503
[img]
Preview
PDF
Download (147kB) | Preview

Export

Downloads

Downloads per month over past year

View more statistics

Actions (login required)

Admin Login Admin Login