Posts

Showing posts from May, 2013

Routing misbehavior detection and reaction in MANETs

Abstract: Traditionally, routing protocols for mobile ad-hoc networks (MANETs) assume a safe and a cooperative network setting. In practice, there may be malicious nodes attempt to disrupt the network communication by launching attacks on the routing protocol itself. Protecting the route from malicious attacks is an important yet challenging security issue in mobile ad-hoc networks. In this paper, we proposed challenged node technique is to detect and react on the adversary nodes at the route discovery phase. In challenged node technique, any intermediate node, new route reply verifies with next hop node challenged replay by its mitigate neighborhood nodes. In essence, new route replay verification algorithm describe about how efficiently it detects the malicious node in route discovery process. Eventually our simulation results are shown that challenged node technique has better malicious node detection probability and packet delivery ratio.  http://ieeexplore.ieee.org/xp

Taxonomy of Network Layer Attacks in Wireless Mesh Network

Abstract: Wireless Mesh Networks (WMNs) network layer attacks mainly occur due to in secure multi_hop communications. WMN lacks robust security services to protect multi_hop communications and no proper attack analysis has been taken place.   Most of the existing techniques protect WMNs only from single adversary node, but these techniques are failed to protect against multiple colluding attacks. This is mainly because no proper attacks classification available in WMN. To overcome these problems and strengthen the future solutions, we have done clear analytical survey on network layer attacks in WMN. Eventually, we have come up with taxonomy of network layer attack. http://link.springer.com/chapter/10.1007%2F978-3-642-30111-7_90

Hierarchical Wireless Mesh Networks Scalable Secure Framework

Abstract: Wireless Mesh Networks (WMNs) are more scalable than any other wireless networks, because of its unique features such as interoperability, integration and heterogeneous device support. All these features are more vulnerable to various types of attacks due to lack of robust security frameworks in WMNs. Thus, protect the scalability features of WMNs against adversary nodes is a major issue. In this paper, we have designed Scalable Secure Framework (SSF) to secure the scalability features in WMNs. In which, we have proposed two algorithms: a new router authentication and router deauthentication in backbone mesh. SSF secures the heterogeneous client networks (802.11s and Wi-Fi) communications in client mesh. Our security analysis on SSF proves that WMN is effectively protected from multiple colluding attacks.  Keywords: authentication , heterogeneous, scalability, interoperability , deauthentication Scalable Secure Framework (SSF): PDF

Cross-layer IDS for Rushing attack in Wireless Mesh Networks

Publications Cross-layer IDS for Rushing attack in Wireless Mesh Networks Abstract: Wireless Mesh Networks (WMNs) are a promising technology to provide the wireless internet connectivity. WMNs are becoming a popular choice for wireless internet service providers to offer internet connectivity as it allows a fast, easy and inexpensive network deployment. However, security in WMNs is still in its infancy. Security and privacy has been a major concern in WMNs. WMNs are susceptible to broad variety of attacks due to its open medium, dynamic topology and lack of physical security. WMNs are more vulnerable in Network layer. Several attacks are possible in the network layer. Some of the attacks have possible solutions but there is no solution for to detect Rushing attack which leads to the Denial of Service. In this paper, the authors proposed Cross-Layer Intrusion Detection System (CLIDS) for Rushing attack. We evaluated the performance of our technique using network si