Loading...

Identifying monitoring nodes in MANET by detecting unauthorized and malicious nodes

Kuchaki Rafsanjani, M ; Sharif University of Technology | 2008

434 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/ITSIM.2008.4631948
  3. Publisher: 2008
  4. Abstract:
  5. Mobile ad hoc networks have different characteristics from wired networks. There are new challenges related to security issues that need to be addressed. In this paper, first, critical nodes and authentication in mobile ad hoc networks are discussed. Then, a monitoring nodes selection method with high battery power in these networks is presented. We propose a three-phase detection scheme. In the first phase, unauthorized nodes and in the second phase, malicious nodes are detected. Finally in the third phase, nodes with the largest battery power as monitoring nodes are considered. In the first and the second phases, detection scheme uses non-interactive zero knowledge technique in order to determine the identity of nodes. In this technique, nodes do not need to exchange multiple messages to prove their identities. The proposed scheme is enabled with the main operations of ad hoc networking, which are found at the link and network layers. So, the proposed scheme could improve intrusion detection in the area of security. © 2008 IEEE
  6. Keywords:
  7. Information technology ; Intrusion detection ; Telecommunication networks ; Wireless telecommunication systems ; Ad Hoc networkings ; Battery powers ; Critical nodes ; Detection schemes ; Malicious nodes ; Mobile Ad hoc networks ; Monitoring nodes ; Multiple messages ; Network layers ; Phase detections ; Second phases ; Security issues ; Selection methods ; Wired networks ; Zero knowledges ; Ad hoc networks
  8. Source: International Symposium on Information Technology 2008, ITSim, Kuala Lumpur, 26 August 2008 through 29 August 2008 ; Volume 3 , 2008 ; 9781424423286 (ISBN)
  9. URL: https://ieeexplore.ieee.org/document/4631948