Detecting unauthorized and compromised nodes in mobile ad hoc networks

  • Authors:
  • Nikos Komninos;Dimitris Vergados;Christos Douligeris

  • Affiliations:
  • Department of Information and Communication Systems Engineering, University of the Aegean, 83200 Samos, Greece;Department of Information and Communication Systems Engineering, University of the Aegean, 83200 Samos, Greece;Department of Informatics, University of Piraeus, 18534 Piraeus, Greece

  • Venue:
  • Ad Hoc Networks
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security of mobile ad hoc networks (MANET) has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. In this paper, the security challenges in intrusion detection and authentication are identified and the different types of attacks are discussed. We propose a two-phase detection procedure of nodes that are not authorized for specific services and nodes that have been compromised during their operation in MANET. The detection framework is enabled with the main operations of ad hoc networking, which are found at the link and network layers. The proposed framework is based on zero knowledge techniques, which are presented through proofs.