In: Proceedings of 1st ACM workshop on ad hoc and sensor networks, pp 135–147 Huang Y-A, Lee W (2003) A cooperative intrusion detection system for ad hoc networks. Hu Y, Johnson DB, Perrig A (2003) SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Hu Y, Perrig A, Johnson DB (2002) Ariadne: a secure on-demand routing protocol for ad hoc networks. World Scientific, Singaporeĭeng H, Li W, Agrawal DP (2002) Routing security in wireless ad hoc network. IEEE Commun Mag 22(1):6–12Ĭordeiro C, Agrawal DP (2006) Ad hoc and sensor networks: theory and application. In: IEEE vehicular technology conference, VTS 54th, vol 4, pp 2143–2147Ĭampista MEM, Esposito PM, Moraes IM, Costa LHMK, Duarte OCMM, Passos DG, Albuquereque CVN, Saade DCM, Rubistein MG (2008) Routing metrics and protocols for Wireless Mesh Networks. IEEE Wirel Commun (Apr)īhargava S, Agrawal DP (2001) Security enhancements in AODV protocol for wireless ad hoc networks. IEEE Commun Mag (Sept)īen Salem N, Hubaux JP (2006) Securing Wireless Mesh Networks. Brookes Cole Publishing, Pacific GroveĪkyildiz IF, Wang X (2005) A survey on Wireless Mesh Networks. We finally evaluate the effectiveness of the proposed architecture using simulation in ns-2.Īgrawal DP, Zeng Q-A (2006) Introduction to wireless and mobile networks, 2nd edn. We collect valuable information on attacker’s strategy from the intrusion logs gathered at a given honeypot. They are deployed as roaming software agents that tour the network and lure attackers by sending route request advertisements. We propose a novel strategy by employing mobile honeypot agents that utilize their topological knowledge and detect such spurious route advertisements. The attacker can falsify routing metrics such as the shortest transmission time to reach any destination and thereby suck the network traffic. The attackers can exploit hidden loopholes in the multipath mesh routing protocol to have a suction attack called the blackhole attack. The open architecture of WMN, multi-hop nature of communication, different management styles, and wireless communication paves way to malicious attackers. The underlying routing protocol naively assumes that all the nodes in the network are non-malicious. A Wireless Mesh Network (WMN) is a promising way of providing low-cost broadband Internet access.
0 Comments
Leave a Reply. |