Identifying monitoring nodes in MANET by detecting unauthorized and malicious nodes

Mobile ad hoc networks have different characteristics from wired networks. There are new challenges related to security issues that need to be addressed. In this paper, first, critical nodes and authentication in mobile ad hoc networks are discussed. Then, a monitoring nodes selection method with high battery power in these networks is presented. We propose a three-phase detection scheme. In the first phase, unauthorized nodes and in the second phase, malicious nodes are detected. Finally in the third phase, nodes with the largest battery power as monitoring nodes are considered. In the first and the second phases, detection scheme uses non-interactive zero knowledge technique in order to determine the identity of nodes. In this technique, nodes do not need to exchange multiple messages to prove their identities. The proposed scheme is enabled with the main operations of ad hoc networking, which are found at the link and network layers. So, the proposed scheme could improve intrusion detection in the area of security.

[1]  Dongwoo Kim,et al.  Lifetime-enhancing selection of monitoring nodes for intrusion detection in mobile ad hoc networks , 2006 .

[2]  Panagiotis Papadimitratos,et al.  Path set selection in mobile ad hoc networks , 2002, MobiHoc '02.

[3]  Nitin H. Vaidya,et al.  Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..

[4]  Srdjan Capkun,et al.  Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..

[5]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[6]  Ali Movaghar-Rahimabadi,et al.  Anonymous authentication protocol for GSM networks , 2008, Int. J. Secur. Networks.

[7]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[8]  Udo W. Pooch,et al.  Towards adaptive intrusion detection in mobile ad hoc networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[9]  A. Karygiannis,et al.  Detecting critical nodes for MANET intrusion detection systems , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).

[10]  M.R. Lyu,et al.  An authentication service against dishonest users in mobile ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[11]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[12]  Prabir Bhattacharya,et al.  A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).

[13]  Dharma P. Agrawal,et al.  A novel authentication scheme for ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[14]  Christos Douligeris,et al.  Detecting unauthorized and compromised nodes in mobile ad hoc networks , 2007, Ad Hoc Networks.

[15]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[16]  Haiyun Luo,et al.  Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .

[18]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[19]  Leandros Tassiulas,et al.  Energy conserving routing in wireless ad-hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).