Security in Ad Hoc Networks: A Location Based Impersonation Detection Method

被引:1
|
作者
Rana, Md. Mashud [1 ]
Ahmed, Khandakar Entenam Unayes [1 ]
Sumel, Nazmur Rowshan [1 ]
Alam, Md. Shamsul [1 ]
Sarkar, Liton [1 ]
机构
[1] Shahjalal Univ Sci & Technol, Dept Comp Sci & Engn, Sylhet, Bangladesh
关键词
Impersonation; Security Threats; Transmitter's Location; Dynamic Topology; Malicious Node;
D O I
10.1109/ICCET.2009.220
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Ad-hoc networks have a promising future in network area. it is highly demandable for its sudden and emergency utility. Ever changing topology adorned it with high flexibility. Due to its characteristics it is vulnerable to the various attacks, which are not known in wired networks. Out of these threats, impersonation attack is the most terrific and unavoidable, that can collapse the entire network. In this paper, we proposed a location based impersonation detection model that can uniquely locate the transmitter's position. Specifically we consider signal direction and self-positioning of the nodes to determine the transmitter's location. We use these pieces of information with some postulates to identify the impersonation. This greatly reduces the security threats in ad hoc network.
引用
收藏
页码:380 / 384
页数:5
相关论文
共 50 条
  • [41] One method for selfish nodes security problem in ad hoc networks
    Wu, Hao
    Zheng, Zhi-Bin
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2005, 33 (SUPPL.): : 2317 - 2321
  • [42] Security in ad hoc networks: An extension of dynamic source routing in mobile ad hoc networks
    Venkataraman, Revathi
    Pushpalatha, M.
    2006 10TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2006, : 723 - +
  • [43] A novel location management method based on ad hoc networking
    Masajedian, SMS
    Khoshbin, H
    NETWORKS 2004 11TH INTERNATIONAL TELECOMMUNICATIONS NETWORK STRATEGY AND PLANNING SYMPOSIUM, PROCEEDINGS, 2004, : 93 - 97
  • [44] Editorial for the Special Issue of Ad hoc networks "Security issues in sensor and Ad hoc networks"
    Misic, Jelena
    Singhal, Mukesh
    AD HOC NETWORKS, 2007, 5 (01) : 1 - 2
  • [45] Location safety protection in ad hoc networks
    Xu, Toby
    Cai, Ying
    AD HOC NETWORKS, 2009, 7 (08) : 1551 - 1562
  • [46] Location discovery in ad hoc sensor networks
    Park, S
    Bhatia, A
    COMPUTERS AND THEIR APPLICATIONS, 2004, : 358 - 361
  • [47] A novel intrusion detection method for mobile ad hoc networks
    Yi, P
    Zhong, YP
    Zhang, SY
    ADVANCES IN GRID COMPUTING - EGC 2005, 2005, 3470 : 1183 - 1192
  • [48] A scalable quorum based location service in ad hoc and sensor networks
    Liu, Dandan
    Stojmenovic, Ivan
    Jia, Xiaohua
    2006 IEEE INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2006, : 439 - +
  • [49] A Routing Based on Geographical Location Information for Wireless Ad Hoc Networks
    Li, Yongqiang
    Wang, Zhong
    Fan, Qinggang
    Cai, Yanning
    Wu, Yubin
    Zhu, Yunjie
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 657 - 666
  • [50] Practical Location-based Routing in Vehicular Ad Hoc Networks
    Li, Zhi
    Zhu, Yanmin
    Li, Minglu
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 94 - 99