سال انتشار: ۱۳۹۰
محل انتشار: چهاردهمین کنفرانس دانشجویی مهندسی برق ایران
تعداد صفحات: ۷
M Nouri – Department of Electrical Engineering, University of Science & Technology
S Abazari Aghdam – Islamic Azad university south Tehran branch, Tehran, Iran
In this paper, first the concept of wormhole attack and five kinds of this attack and clusters are introduced. After that two intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood are explained. The first technique is designed for detection of malicious nodes in a neighborhood of nodes in which each pair of nodes in the neighborhood is within radio range of each other. The second technique is designed for detection of malicious nodes in a neighborhood of nodes, in which each pair of nodes may not be in radio range of each other but where there is a node among them which has all the other nodes in its one-hop vicinity. Both techniques use message passing between the nodes. A node called the monitor node initiates the detection process. Based on the messages that it receives during the detection process, each node determines the nodes it suspects to be malicious and send votes to the monitor node. The monitor node upon inspecting the votes determines the malicious nodes from among the suspected nodes. Defect of these techniques is the impossibility of detecting wormhole attack in the form of out of band attack so in this paper we complete these techniques to give the ability of detecting wormhole attack and isolating them from routing process.