Detecting packet-dropping faults in mobile ad-hoc networks

被引:0
|
作者
Medidi, SR [1 ]
Medidi, M [1 ]
Gavini, S [1 ]
机构
[1] Washington State Univ, Sch Elect Engn & Comp Sci, Pullman, WA 99164 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile Ad-hoc networks are inherently prone to security attacks, with node mobility being the primary cause in allowing security breaches. This makes the network susceptible to Byzantyne faults with packets getting misrouted, corrupted or dropped. In this paper we propose solutions using an unobtrusive monitoring technique using the "Detection Manager" to locate malicious or faulty nodes that misroute, corrupt or drop packets. The unobtrusive monitoring technique is similar to an intrusion detection system that monitors system activity logs to determine if the system is under attack. This technique uses information from different network layers to detect malicious nodes. The detection manager we are developing for Mobile Ad-hoc networks stores several rules for responding to different situations. Any single node in the network can use unobtrusive monitoring without relying on the cooperation of other nodes, which makes unobtrusive monitoring easy to implement and deploy. Simulations of Mobile Ad-hoc networks that contain malicious nodes indicate that unobtrusive monitoring has a high detection effectiveness with low false positive rate.
引用
收藏
页码:1708 / 1712
页数:5
相关论文
共 50 条
  • [31] A robust packet-dropping covert channel for mobile intelligent terminals
    Li Yuanzhang
    Liu Junli
    Xu Xinting
    Zhang Xiaosong
    Zhang Li
    Zhang Quanxin
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (10) : 6928 - 6950
  • [32] Analyzing the Behavior of Communication Faults in ad-hoc Networks
    Leme, Everaldo
    Nogarotto, Danilo
    Moraes, Regina
    Martins, Paulo S.
    [J]. 2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [33] Modeling of Network Delay Variation in Packet Voice Communications on Mobile Ad-hoc Networks
    Jelassi, Sofiene
    Rubino, Gerardo
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,
  • [34] Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks
    Kshirsagar, Vishvas Haridas
    Kanthe, Ashok M.
    Simunic, Dina
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (02) : 311 - 320
  • [35] Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks
    Vishvas Haridas Kshirsagar
    Ashok M. Kanthe
    Dina Simunic
    [J]. Wireless Personal Communications, 2018, 100 : 311 - 320
  • [36] Packet size based routing for stable data delivery in Mobile Ad-Hoc Networks
    Khan, Ashiq
    Suzuki, Toshihiro
    Kobayashi, Motonari
    Takita, Wataru
    Yamazaki, Kenichi
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (07) : 2244 - 2254
  • [37] A Cell Biology Inspired Model for Managing Packet Broadcasts in Mobile Ad-hoc Networks
    Sooriyaarachchi, Sulochana J.
    Gamage, Chandana D.
    [J]. 2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 716 - 721
  • [38] A Cell Biology Inspired Model for Managing Packet Broadcasts in Mobile Ad-hoc Networks
    Sooriyaarachchi, S. J.
    Fernando, W. A. C.
    Gamage, C. D.
    [J]. ENGINEER-JOURNAL OF THE INSTITUTION OF ENGINEERS SRI LANKA, 2015, 48 (04): : 25 - 32
  • [39] Prefix routing in mobile ad-hoc networks
    Chen, X
    Wu, J
    Jia, XD
    [J]. PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2002, : 66 - 71
  • [40] Security In Multicast Mobile Ad-Hoc Networks
    Shanthi, N.
    Ganesan, L.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (07): : 326 - 330