WO2009122437A3 - Security in mobile ad hoc networks - Google Patents

Security in mobile ad hoc networks Download PDF

Info

Publication number
WO2009122437A3
WO2009122437A3 PCT/IN2009/000204 IN2009000204W WO2009122437A3 WO 2009122437 A3 WO2009122437 A3 WO 2009122437A3 IN 2009000204 W IN2009000204 W IN 2009000204W WO 2009122437 A3 WO2009122437 A3 WO 2009122437A3
Authority
WO
WIPO (PCT)
Prior art keywords
node
nodes
means adapted
suspicious
manet
Prior art date
Application number
PCT/IN2009/000204
Other languages
French (fr)
Other versions
WO2009122437A2 (en
Inventor
Jaydip Sen
Original Assignee
Tata Consultancy Services Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tata Consultancy Services Limited filed Critical Tata Consultancy Services Limited
Publication of WO2009122437A2 publication Critical patent/WO2009122437A2/en
Publication of WO2009122437A3 publication Critical patent/WO2009122437A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A system for detecting malicious gray-hole nodes in a mobile ad hoc network (MANET) comprising a group of nodes, said system comprising node mapping means adapted to map each node in the MANET.; data collection means adapted to collect data forwarding (routing) information from each node to obtain a data routing record of the node, in order to enable identification and creation of a list of good nodes and suspicious nodes; local anomaly detection means adapted to determine level of suspicion of each of said suspicious nodes; co-operative anomaly detection means adapted to identify one suspicious node at a time and monitor routing activity of said identified suspicious node with other nodes of said network to achieve a conformity status of said level of suspicion; global alarm raiser means adapted to send an alarm message in relation to said identified suspicious node to each of the other nodes of the MANET; and isolator means adapted to isolate each of said suspicious node from the MANET to achieve an uninterrupted communication in the network.
PCT/IN2009/000204 2008-03-31 2009-03-26 Security in mobile ad hoc networks WO2009122437A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN718MU2008 2008-03-31
IN718/MUM/2008 2008-03-31

Publications (2)

Publication Number Publication Date
WO2009122437A2 WO2009122437A2 (en) 2009-10-08
WO2009122437A3 true WO2009122437A3 (en) 2012-11-29

Family

ID=41136022

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2009/000204 WO2009122437A2 (en) 2008-03-31 2009-03-26 Security in mobile ad hoc networks

Country Status (1)

Country Link
WO (1) WO2009122437A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297973A (en) * 2013-06-04 2013-09-11 河海大学常州校区 Method for detecting Sybil attack in underwater wireless sensor networks

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827311A (en) * 2010-02-10 2010-09-08 北京播思软件技术有限公司 Method for realizing interconnection of mobile communication terminals in AD-HOC network
US9449065B1 (en) * 2010-12-28 2016-09-20 Amazon Technologies, Inc. Data replication framework
US8554762B1 (en) 2010-12-28 2013-10-08 Amazon Technologies, Inc. Data replication framework
CN102291712B (en) * 2011-08-16 2014-09-03 清华大学 Adaptive active defense realizing method and system in WSN (wireless sensor network)
KR20150058304A (en) 2012-09-18 2015-05-28 더 조지 워싱턴 유니버시티 Emergent network defense system
CN108989465B (en) * 2018-08-30 2021-03-12 交叉信息核心技术研究院(西安)有限公司 Consensus method, server, storage medium and distributed system
CN117929911A (en) * 2019-02-01 2024-04-26 诺宝公司 Node fault detection and resolution in distributed databases
CN115276935B (en) * 2022-07-14 2023-04-07 深圳鹏龙通科技有限公司 Signal frame sending method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040028000A1 (en) * 2002-08-12 2004-02-12 Harris Corporation Mobile ad-hoc network with intrusion detection features and related methods
WO2005104455A2 (en) * 2004-04-27 2005-11-03 Nokia Corporation Providing security in proximity and ad-hoc networks

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040028000A1 (en) * 2002-08-12 2004-02-12 Harris Corporation Mobile ad-hoc network with intrusion detection features and related methods
WO2005104455A2 (en) * 2004-04-27 2005-11-03 Nokia Corporation Providing security in proximity and ad-hoc networks

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297973A (en) * 2013-06-04 2013-09-11 河海大学常州校区 Method for detecting Sybil attack in underwater wireless sensor networks
CN103297973B (en) * 2013-06-04 2016-09-07 河海大学常州校区 Witch's intrusion detection method in underwater sensor network

Also Published As

Publication number Publication date
WO2009122437A2 (en) 2009-10-08

Similar Documents

Publication Publication Date Title
WO2009122437A3 (en) Security in mobile ad hoc networks
Coppolino et al. An intrusion detection system for critical information infrastructures using wireless sensor network technologies
Mtibaa et al. Friend or foe? Detecting and isolating malicious nodes in mobile edge computing platforms
Konate et al. Attacks Analysis in mobile ad hoc networks: Modeling and Simulation
Sen An intrusion detection architecture for clustered wireless ad hoc networks
Han et al. Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks
Bendjima et al. Wormhole attack detection in wireless sensor networks
Hayajneh et al. Deworm: A simple protocol to detect wormhole attacks in wireless ad hoc networks
CN102970687A (en) Method for deploying detection node and detecting intrusion in wireless sensor network
Dwivedi et al. Detection and prevention analysis of wormhole attack in wireless sensor network
CN102769845A (en) Wormhole detecting method based on specific triple-jump channel path in wireless sensor network
Lim et al. Hop-by-Hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks
CN102752756A (en) Method and device for preventing surfing the Internet by privately connecting wireless access point (AP)
WO2017093724A1 (en) System and method for detection and isolation of network activity
Hemalatha et al. Novel link establishment communication scheme against selfish attack using node reward with trust level evaluation algorithm in MANET
Frej et al. Secure data aggregation model (SDAM) in wireless sensor networks
Mohajer et al. Trusted-CDS based intrusion detection system in wireless sensor network (TC-IDS)
Gao et al. Detection and defense technology of blackhole attacks in wireless sensor network
US9760717B2 (en) Communication device, system, and control method
Sharma et al. A review of selective forwarding attacks in wireless sensor networks
JP2014212366A (en) Node device, communication method, and communication program
Kaur et al. Detection and prevention of blackhole attacks in wireless sensor networks
Hussain et al. Evaluating network layer selfish behavior and a method to detect and mitigate its effect in MANETs
Louta et al. A survey on reputation-based cooperation enforcement schemes in wireless ad hoc networks
Khalil et al. CTAC: Control traffic tunneling attacks’ countermeasures in mobile wireless networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09728757

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09728757

Country of ref document: EP

Kind code of ref document: A2