Security in Ad Hoc Networks: A Location Based Impersonation Detection Method

被引:1
|
作者
Rana, Md. Mashud [1 ]
Ahmed, Khandakar Entenam Unayes [1 ]
Sumel, Nazmur Rowshan [1 ]
Alam, Md. Shamsul [1 ]
Sarkar, Liton [1 ]
机构
[1] Shahjalal Univ Sci & Technol, Dept Comp Sci & Engn, Sylhet, Bangladesh
关键词
Impersonation; Security Threats; Transmitter's Location; Dynamic Topology; Malicious Node;
D O I
10.1109/ICCET.2009.220
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Ad-hoc networks have a promising future in network area. it is highly demandable for its sudden and emergency utility. Ever changing topology adorned it with high flexibility. Due to its characteristics it is vulnerable to the various attacks, which are not known in wired networks. Out of these threats, impersonation attack is the most terrific and unavoidable, that can collapse the entire network. In this paper, we proposed a location based impersonation detection model that can uniquely locate the transmitter's position. Specifically we consider signal direction and self-positioning of the nodes to determine the transmitter's location. We use these pieces of information with some postulates to identify the impersonation. This greatly reduces the security threats in ad hoc network.
引用
收藏
页码:380 / 384
页数:5
相关论文
共 50 条
  • [31] On the Use of Security Analytics for Attack Detection In Vehicular Ad Hoc Networks
    Gantsou, Dhavy
    2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [32] Security scheme for malicious node detection in mobile ad hoc networks
    Rathod, P
    Mody, N
    Gada, D
    Gogri, R
    Dedhia, Z
    Sanyal, S
    Abraham, A
    DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 541 - 542
  • [33] Cluster based security scheme in wireless Ad Hoc networks
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    Jisuanji Yanjiu yu Fazhan, 2006, 2 (238-243):
  • [34] Utilizing the uncertainty of intrusion detection to strengthen security for ad hoc networks
    Dreef, D
    Ahari, S
    Wu, K
    King, V
    AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2004, 3158 : 82 - 95
  • [35] An Efficient Method for Identifying MaxRS Location in Mobile Ad Hoc Networks
    Nakayama, Yuki
    Amagata, Daichi
    Hara, Takahiro
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2016, PT I, 2016, 9827 : 37 - 51
  • [36] SPM: A Security Policy Based on Micropayment in Ad hoc Networks
    Wang, Yi
    Wang, Furong
    Rong, Chunming
    Wang, Sufang
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 639 - +
  • [37] A cluster-based security architecture for ad hoc networks
    Bechler, M
    Hof, HJ
    Kraft, D
    Pählke, F
    Wolf, L
    IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2393 - 2403
  • [38] A Hybrid Location Identification Method in Wireless Ad Hoc/Sensor Networks
    Zhao, Yifan
    Lung, Chung-Horng
    Lambadaris, Ioannis
    Goel, Nishith
    MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2009, : 465 - +
  • [39] Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks
    R. Santhana Krishnan
    E. Golden Julie
    Y. Harold Robinson
    Raghvendra Kumar
    Le Hoang Son
    Tong Anh Tuan
    Hoang Viet Long
    Wireless Networks, 2020, 26 : 1275 - 1289
  • [40] Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks
    Krishnan, R. Santhana
    Julie, E. Golden
    Robinson, Y. Harold
    Kumar, Raghvendra
    Le Hoang Son
    Tong Anh Tuan
    Hoang Viet Long
    WIRELESS NETWORKS, 2020, 26 (02) : 1275 - 1289