Security in Ad Hoc Networks: A Location Based Impersonation Detection Method

被引:1
|
作者
Rana, Md. Mashud [1 ]
Ahmed, Khandakar Entenam Unayes [1 ]
Sumel, Nazmur Rowshan [1 ]
Alam, Md. Shamsul [1 ]
Sarkar, Liton [1 ]
机构
[1] Shahjalal Univ Sci & Technol, Dept Comp Sci & Engn, Sylhet, Bangladesh
关键词
Impersonation; Security Threats; Transmitter's Location; Dynamic Topology; Malicious Node;
D O I
10.1109/ICCET.2009.220
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Ad-hoc networks have a promising future in network area. it is highly demandable for its sudden and emergency utility. Ever changing topology adorned it with high flexibility. Due to its characteristics it is vulnerable to the various attacks, which are not known in wired networks. Out of these threats, impersonation attack is the most terrific and unavoidable, that can collapse the entire network. In this paper, we proposed a location based impersonation detection model that can uniquely locate the transmitter's position. Specifically we consider signal direction and self-positioning of the nodes to determine the transmitter's location. We use these pieces of information with some postulates to identify the impersonation. This greatly reduces the security threats in ad hoc network.
引用
收藏
页码:380 / 384
页数:5
相关论文
共 50 条
  • [21] Location-based IT assignment protocol for ad hoc networks
    Sheu, Jang-Ping
    Liu, Yu-Cheng
    Tu, Shin-Chih
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 234 - +
  • [22] Object Location in Cluster Based Mobile Ad Hoc Networks
    Hamsavath, Prasad Naik
    Singh, G. V.
    Dhurandher, Sanjay K.
    INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 53 - +
  • [23] Ad-hoc networks security
    Raju, G. V. S.
    3rd International Conference on Computing, Communications and Control Technologies, Vol 2, Proceedings, 2005, : 209 - 212
  • [24] Location based multihop communication in mobile ad hoc networks
    Vilmos Simon
    András Kőkuti
    Telecommunication Systems, 2015, 59 : 523 - 530
  • [25] A location based QoS routing protocol for Ad Hoc networks
    Liu, HY
    Li, YY
    AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 830 - 833
  • [26] Location Based Data Dissemination in Mobile Ad Hoc Networks
    Kokuti, Andras
    Simon, Vilmos
    2012 35TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2012, : 57 - 61
  • [27] Location based multihop communication in mobile ad hoc networks
    Simon, Vilmos
    Kokuti, Andras
    TELECOMMUNICATION SYSTEMS, 2015, 59 (04) : 523 - 530
  • [28] Signal Detection Method Based on Data Characteristics in Vehicular Ad Hoc Networks
    Li, Yi
    Han, Shuangshuang
    Chen, Shichao
    2024 35TH IEEE INTELLIGENT VEHICLES SYMPOSIUM, IEEE IV 2024, 2024, : 442 - 446
  • [29] A cluster based security model for mobile ad hoc networks
    Chandra, J
    Singh, LL
    2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 413 - 416
  • [30] Cluster based security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 391 - +