Detecting packet-dropping faults in mobile ad-hoc networks

被引:0
|
作者
Medidi, SR [1 ]
Medidi, M [1 ]
Gavini, S [1 ]
机构
[1] Washington State Univ, Sch Elect Engn & Comp Sci, Pullman, WA 99164 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile Ad-hoc networks are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. This makes the network susceptible to Byzantyne faults with packets getting misrouted, corrupted or dropped. In this paper we propose solutions using an unobtrusive monitoring technique using the "Detection Manager" to locate malicious or faulty nodes that misroute, corrupt or drop packets. The unobtrusive monitoring technique is similar to an intrusion detection system that monitors system activity logs to determine if the system is under attack. This technique uses information from different network layers to detect malicious nodes. The detection manager we are developing for Mobile Ad-hoc networks stores several rules for responding to different situations. Any single node in the network can use unobtrusive monitoring without relying on the cooperation of other nodes, which makes unobtrusive monitoring easy to implement and deploy. Simulations of Mobile Ad-hoc networks that contain malicious nodes indicate that unobtrusive monitoring has a high detection effectiveness with low false positive rate.
引用
收藏
页码:1708 / 1712
页数:5
相关论文
共 50 条
  • [21] Mobile and ad-hoc local networks
    Hassanein, H
    Nikolaidis, I
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 41 (03): : 285 - 287
  • [22] Actors for mobile ad-hoc networks
    Dedecker, J
    Van Belle, W
    [J]. EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2004, 3207 : 482 - 494
  • [23] QoS in Mobile Ad-Hoc Networks
    Pushp Sra
    Satish Chand
    [J]. Wireless Personal Communications, 2019, 105 : 1599 - 1616
  • [24] Packet size based routing for route stability in mobile ad-hoc networks
    Khan, Ashiq
    Suzuki, Toshihiro
    Kobayashi, Motonari
    Morita, Masanori
    [J]. 2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 536 - 540
  • [25] Analytical Approach towards Packet Drop Attacks in Mobile Ad-hoc Networks
    Kshirsagar, Vishvas
    Kanthe, Ashok M.
    Simunic, Dina
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 60 - 63
  • [26] QoS in Mobile Ad-Hoc Networks
    Sra, Pushp
    Chand, Satish
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (04) : 1599 - 1616
  • [27] Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad hoc Networks
    Hayajneh, Thaier
    Krishnamurthy, Prashant
    Tipper, David
    Kim, Taehoon
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 1062 - 1067
  • [28] Distributed control over structured and packet-dropping networks
    Jiang, Shengxiang
    Voulgaris, Petros G.
    Neogi, Natasha
    [J]. INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2008, 18 (14) : 1389 - 1408
  • [29] Resisting malicious packet dropping in wireless ad hoc networks
    Just, M
    Kranakis, E
    Wan, T
    [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2003, 2865 : 151 - 163
  • [30] A Reputation-based Scheme against Malicious Packet Dropping for Mobile Ad Hoc Networks
    Song JianHua
    Ma ChuanXiang
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 113 - 117