Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks
KMN '02 Proceedings of the IEEE Workshop on Knowledge Media Networking
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
Intrusion detection techniques for mobile wireless networks
Wireless Networks
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Visualization of wormholes in sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
Verifying Physical Presence of Neighbors against Replay-based Attacks in Wireless Ad Hoc Networks
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
On the Survivability of Routing Protocols in Ad Hoc Wireless Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
An effective intrusion detection approach for OLSR MANET protocol
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
Wormhole attacks in wireless networks
IEEE Journal on Selected Areas in Communications
A dynamic intrusion detection hierarchy for MANETs
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Timing-based localization of in-band wormhole tunnels in MANETs
Proceedings of the third ACM conference on Wireless network security
Prevention of wormhole attacks in mobile ad hoc networks by intrusion detection nodes
WASA'10 Proceedings of the 5th international conference on Wireless algorithms, systems, and applications
Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
We have implemented a fully-functional wormhole attack in an IPv6 802.11b wireless Mobile Ad Hoc Network (MANET) test bed running a proactive routing protocol. Using customised analysis tools we study the traffic collected from the MANET at three different stages: i) regular operation, ii) with a "benign" wormhole joining distant parts of the network, and iii) under stress from wormhole attackers who control a link in the MANET and drop packets at random. Our focus is on detecting anomalous behaviour using timing analysis of routing traffic within the network.We first show how to identify intruders based on the protocol irregularities that their presence creates once they begin to drop traffic. More significantly, we go on to demonstrate that the mere existence of the wormhole itself can be identified, before the intruders begin the packet-dropping phase of the attack, by applying simple signal-processing techniques to the arrival times of the routing management traffic. This is done by relying on a property of proactive routing protocols- that the stations must exchange management information on a specified, periodic basis. This exchange creates identifiable traffic patterns and an intrinsic "valid station" fingerprint that can be used for intrusion detection.