Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
The Honeynet Project: Trapping the Hackers
IEEE Security and Privacy
Black hole attack in mobile Ad Hoc networks
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Ad Hoc & Sensor Networks: Theory And Applications
Ad Hoc & Sensor Networks: Theory And Applications
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
A Perceptron Based Classifier for Detecting Malicious Route Floods in Wireless Mesh Networks
ICCGI '07 Proceedings of the International Multi-Conference on Computing in the Global Information Technology
Integrated security architecture for wireless mesh networks
Integrated security architecture for wireless mesh networks
Distributed self-policing architecture for fostering node cooperation in wireless mesh networks
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Securing wireless mesh networks
IEEE Wireless Communications
Wireless Mesh Networks: Current Challenges and Future Directions of Web-In-The-Sky
IEEE Wireless Communications
Routing security in wireless ad hoc networks
IEEE Communications Magazine
A survey on wireless mesh networks
IEEE Communications Magazine
Routing Metrics and Protocols for Wireless Mesh Networks
IEEE Network: The Magazine of Global Internetworking
Trust, security and privacy for pervasive applications
The Journal of Supercomputing
Honeypot Framework for Wireless Sensor Networks
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 0.00 |
A Wireless Mesh Network (WMN) is a promising way of providing low-cost broadband Internet access. The underlying routing protocol naively assumes that all the nodes in the network are non-malicious. The open architecture of WMN, multi-hop nature of communication, different management styles, and wireless communication paves way to malicious attackers. The attackers can exploit hidden loopholes in the multipath mesh routing protocol to have a suction attack called the blackhole attack. The attacker can falsify routing metrics such as the shortest transmission time to reach any destination and thereby suck the network traffic.We propose a novel strategy by employing mobile honeypot agents that utilize their topological knowledge and detect such spurious route advertisements. They are deployed as roaming software agents that tour the network and lure attackers by sending route request advertisements. We collect valuable information on attacker's strategy from the intrusion logs gathered at a given honeypot. We finally evaluate the effectiveness of the proposed architecture using simulation in ns-2.