A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Securing Authentication and Privacy in Ad hoc Partitioned Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
A Mathematical Theory of Communication
A Mathematical Theory of Communication
DDoS attack detection method using cluster analysis
Expert Systems with Applications: An International Journal
Performance analysis of machine learning algorithms for intrusion detection in MANETs
International Journal of Wireless and Mobile Computing
Hi-index | 12.06 |
In recent years, the popularity of wireless devices has grown dramatically. Mobile ad hoc networks (MANETs) are considered to be vitally important for wireless communication. However, the dynamic nature of MANETs makes their routing protocols vulnerable to attacks. In this paper, we focused on sinkhole attacks, representative of routing-disruption attacks. First, we analyzed sinkhole attacks under a dynamic source routing protocol. Unlike wired networks, where routing-disruption attacks can be prevented through authentication mechanisms, application of authentication techniques in wireless networks is nontrivial-the lack of centralization hampers authentication support management. We then used a data mining technique called cluster analysis to develop a sinkhole attack detection method in wireless networks. The cluster analysis to route request packets does not require any centralized infrastructure. Robust features for detecting sinkhole attacks in a distributed manner are suggested. Simulation shows excellent classification performance and successful distributed detections.