Security in Ad Hoc Networks: A Location Based Impersonation Detection Method

被引:1
|
作者
Rana, Md. Mashud [1 ]
Ahmed, Khandakar Entenam Unayes [1 ]
Sumel, Nazmur Rowshan [1 ]
Alam, Md. Shamsul [1 ]
Sarkar, Liton [1 ]
机构
[1] Shahjalal Univ Sci & Technol, Dept Comp Sci & Engn, Sylhet, Bangladesh
关键词
Impersonation; Security Threats; Transmitter's Location; Dynamic Topology; Malicious Node;
D O I
10.1109/ICCET.2009.220
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Ad-hoc networks have a promising future in network area. it is highly demandable for its sudden and emergency utility. Ever changing topology adorned it with high flexibility. Due to its characteristics it is vulnerable to the various attacks, which are not known in wired networks. Out of these threats, impersonation attack is the most terrific and unavoidable, that can collapse the entire network. In this paper, we proposed a location based impersonation detection model that can uniquely locate the transmitter's position. Specifically we consider signal direction and self-positioning of the nodes to determine the transmitter's location. We use these pieces of information with some postulates to identify the impersonation. This greatly reduces the security threats in ad hoc network.
引用
收藏
页码:380 / 384
页数:5
相关论文
共 50 条
  • [1] Wormhole detection method based on location in wireless ad-hoc networks
    Lee, Kyuho
    Jeon, Hyojin
    Kim, Dongkyoo
    NEW TECHNOLOGIES, MOBILITY AND SECURITY, 2007, : 361 - 372
  • [2] PROVIDING LOCATION SECURITY IN VEHICULAR AD HOC NETWORKS
    Yan, Gongjun
    Olariu, Stephan
    Weigle, Michele C.
    IEEE WIRELESS COMMUNICATIONS, 2009, 16 (06) : 48 - 53
  • [3] A location-based routing method for mobile ad hoc networks
    Blazevic, L
    Le Boudec, JY
    Giordano, S
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2005, 4 (02) : 97 - 110
  • [4] A location based routing method for irregular mobile ad hoc networks
    Blac, L
    Le Boudec, JY
    Zevi, SG
    ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 725 - 727
  • [5] Security for cluster based ad hoc networks
    Varadharajan, V
    Shankaran, R
    Hitchens, M
    COMPUTER COMMUNICATIONS, 2004, 27 (05) : 488 - 501
  • [6] An intrusion detection method based on DBN in ad hoc networks
    Tan, Qiu-shi
    Huang, Wei
    Li, Qiang
    WIRELESS COMMUNICATION AND SENSOR NETWORK, 2016, : 477 - 485
  • [7] Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks
    Tamilselvan, Latha
    Sankaranarayanan, V.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (03): : 118 - 123
  • [8] Security Classification-Based Encryption and Detection in Mobile Ad Hoc Networks
    Liu, Mengyao
    Zhang, Yanyan
    Xia, Li
    INTERNATIONAL CONFERENCE ON ELECTRONIC AND ELECTRICAL ENGINEERING (CEEE 2014), 2014, : 66 - 71
  • [9] Study of position security in location service in mobile ad hoc networks
    Hua Bei
    Liao Hongbo
    Xiong Yan
    Guo Yan
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (03): : 563 - 566
  • [10] Security in ad hoc networks
    Molva, R
    Michiardi, P
    PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2003, 2775 : 756 - 775