DocumentCode :
1804201
Title :
Democratic detection of malicious behaviour in MANET: A voting process
Author :
Ochola, Eo ; Eloff, Mm ; van der Poll, Ja
Author_Institution :
Sch. of Comput., Univ. of South Africa, Pretoria, South Africa
fYear :
2013
fDate :
14-16 Aug. 2013
Firstpage :
1
Lastpage :
7
Abstract :
Wireless MANET presents new security problems in comparison to the conventional wired and wireless networks, as it is more vulnerable to malicious attacks due to its unique features. The MANET routing protocols require that the mobile nodes that form such temporal network cooperate with each other to achieve the desired routing purpose for the exchange of information amongst the participating nodes. However, the cooperation cannot be realised where network nodes exhibit malicious operations. The MANET characteristics and applications make it difficult to have a centralised security management entity. Furthermore, the implementation of Power- Aware routing protocols complicates the possibility of relying entirely on watchdog mechanisms to safeguard the network against Black-Hole attack. In addition, the watchdog´s eavesdropping operation violates the TCP protocol rules, and requires buffering of large amount of packets during the monitoring process, which results to extra overheads. This paper proposes an algorithm which utilises Cluster-Heads and votes from neighbourhood nodes to detect and eliminate malicious nodes. It addresses challenges posed by Power-Aware routing protocols and watchdog approaches in detecting Black-Hole attack, thereby increasing nodes´ availability and the overall network performance.
Keywords :
mobile ad hoc networks; routing protocols; telecommunication security; transport protocols; MANET characteristics; MANET routing protocols; TCP protocol rules; black-hole attack; centralised security management; cluster-heads; democratic detection; malicious behaviour; mobile nodes; network performance; node availability; power-aware routing protocols; process monitoring; security problems; temporal network; voting process; watchdog eavesdropping operation; watchdog mechanisms; wired networks; wireless MANET; wireless networks; Clustering algorithms; Mobile ad hoc networks; Power control; Routing; Routing protocols; Security; MANET; black-hole attack; power-aware routing; security; watchdog;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security for South Africa, 2013
Conference_Location :
Johannesburg
Type :
conf
DOI :
10.1109/ISSA.2013.6641051
Filename :
6641051
Link To Document :
بازگشت