Intrusion detection technique for wormhole and following jellyfish and byzantine attacks in wireless mesh network

  • Authors:
  • K. Ganesh Reddy;P. Santhi Thilagam

  • Affiliations:
  • Department of Computer Science and Engineering, NITK, Surathkal, India;Department of Computer Science and Engineering, NITK, Surathkal, India

  • Venue:
  • ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Wireless Mesh Networks (WMNs) have emerging application because of its ad-hoc features, high internet bandwidth capability, and interoperable with various networks. However, all features of WMNs vulnerable due to their inadequate security services, and most of the existing techniques protect WMNs from single adversary node, but failed to protect colluding attacks. We proposed new Intrusion Detection (ID) technique, to protect the WMNs from wormhole attack (colluding attack) and following jellyfish and byzantine attacks. The proposed ID technique works based on different delays such as initial end-to-end packet delay, average end-to-end packet delay, and worst case end-to-end packet delay because wormhole attackers attract the network nodes by sending lower latency. Eventually, simulation results show that, our ID technique improves throughput of the network, when source and destination nodes detect and isolate (select new path which does not contain adversaries) the adversaries in wormhole attack and its following attacks.