WO2009122437A3 - Security in mobile ad hoc networks - Google Patents
Security in mobile ad hoc networks Download PDFInfo
- Publication number
- WO2009122437A3 WO2009122437A3 PCT/IN2009/000204 IN2009000204W WO2009122437A3 WO 2009122437 A3 WO2009122437 A3 WO 2009122437A3 IN 2009000204 W IN2009000204 W IN 2009000204W WO 2009122437 A3 WO2009122437 A3 WO 2009122437A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- node
- nodes
- means adapted
- suspicious
- manet
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A system for detecting malicious gray-hole nodes in a mobile ad hoc network (MANET) comprising a group of nodes, said system comprising node mapping means adapted to map each node in the MANET.; data collection means adapted to collect data forwarding (routing) information from each node to obtain a data routing record of the node, in order to enable identification and creation of a list of good nodes and suspicious nodes; local anomaly detection means adapted to determine level of suspicion of each of said suspicious nodes; co-operative anomaly detection means adapted to identify one suspicious node at a time and monitor routing activity of said identified suspicious node with other nodes of said network to achieve a conformity status of said level of suspicion; global alarm raiser means adapted to send an alarm message in relation to said identified suspicious node to each of the other nodes of the MANET; and isolator means adapted to isolate each of said suspicious node from the MANET to achieve an uninterrupted communication in the network.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN718MU2008 | 2008-03-31 | ||
IN718/MUM/2008 | 2008-03-31 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2009122437A2 WO2009122437A2 (en) | 2009-10-08 |
WO2009122437A3 true WO2009122437A3 (en) | 2012-11-29 |
Family
ID=41136022
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IN2009/000204 WO2009122437A2 (en) | 2008-03-31 | 2009-03-26 | Security in mobile ad hoc networks |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2009122437A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103297973A (en) * | 2013-06-04 | 2013-09-11 | 河海大学常州校区 | Method for detecting Sybil attack in underwater wireless sensor networks |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101827311A (en) * | 2010-02-10 | 2010-09-08 | 北京播思软件技术有限公司 | Method for realizing interconnection of mobile communication terminals in AD-HOC network |
US9449065B1 (en) * | 2010-12-28 | 2016-09-20 | Amazon Technologies, Inc. | Data replication framework |
US8554762B1 (en) | 2010-12-28 | 2013-10-08 | Amazon Technologies, Inc. | Data replication framework |
CN102291712B (en) * | 2011-08-16 | 2014-09-03 | 清华大学 | Adaptive active defense realizing method and system in WSN (wireless sensor network) |
KR20150058304A (en) | 2012-09-18 | 2015-05-28 | 더 조지 워싱턴 유니버시티 | Emergent network defense system |
CN108989465B (en) * | 2018-08-30 | 2021-03-12 | 交叉信息核心技术研究院(西安)有限公司 | Consensus method, server, storage medium and distributed system |
CN117929911A (en) * | 2019-02-01 | 2024-04-26 | 诺宝公司 | Node fault detection and resolution in distributed databases |
CN115276935B (en) * | 2022-07-14 | 2023-04-07 | 深圳鹏龙通科技有限公司 | Signal frame sending method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040028000A1 (en) * | 2002-08-12 | 2004-02-12 | Harris Corporation | Mobile ad-hoc network with intrusion detection features and related methods |
WO2005104455A2 (en) * | 2004-04-27 | 2005-11-03 | Nokia Corporation | Providing security in proximity and ad-hoc networks |
-
2009
- 2009-03-26 WO PCT/IN2009/000204 patent/WO2009122437A2/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040028000A1 (en) * | 2002-08-12 | 2004-02-12 | Harris Corporation | Mobile ad-hoc network with intrusion detection features and related methods |
WO2005104455A2 (en) * | 2004-04-27 | 2005-11-03 | Nokia Corporation | Providing security in proximity and ad-hoc networks |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103297973A (en) * | 2013-06-04 | 2013-09-11 | 河海大学常州校区 | Method for detecting Sybil attack in underwater wireless sensor networks |
CN103297973B (en) * | 2013-06-04 | 2016-09-07 | 河海大学常州校区 | Witch's intrusion detection method in underwater sensor network |
Also Published As
Publication number | Publication date |
---|---|
WO2009122437A2 (en) | 2009-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009122437A3 (en) | Security in mobile ad hoc networks | |
Coppolino et al. | An intrusion detection system for critical information infrastructures using wireless sensor network technologies | |
Mtibaa et al. | Friend or foe? Detecting and isolating malicious nodes in mobile edge computing platforms | |
Konate et al. | Attacks Analysis in mobile ad hoc networks: Modeling and Simulation | |
Sen | An intrusion detection architecture for clustered wireless ad hoc networks | |
Han et al. | Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks | |
Bendjima et al. | Wormhole attack detection in wireless sensor networks | |
Hayajneh et al. | Deworm: A simple protocol to detect wormhole attacks in wireless ad hoc networks | |
CN102970687A (en) | Method for deploying detection node and detecting intrusion in wireless sensor network | |
Dwivedi et al. | Detection and prevention analysis of wormhole attack in wireless sensor network | |
CN102769845A (en) | Wormhole detecting method based on specific triple-jump channel path in wireless sensor network | |
Lim et al. | Hop-by-Hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks | |
CN102752756A (en) | Method and device for preventing surfing the Internet by privately connecting wireless access point (AP) | |
WO2017093724A1 (en) | System and method for detection and isolation of network activity | |
Hemalatha et al. | Novel link establishment communication scheme against selfish attack using node reward with trust level evaluation algorithm in MANET | |
Frej et al. | Secure data aggregation model (SDAM) in wireless sensor networks | |
Mohajer et al. | Trusted-CDS based intrusion detection system in wireless sensor network (TC-IDS) | |
Gao et al. | Detection and defense technology of blackhole attacks in wireless sensor network | |
US9760717B2 (en) | Communication device, system, and control method | |
Sharma et al. | A review of selective forwarding attacks in wireless sensor networks | |
JP2014212366A (en) | Node device, communication method, and communication program | |
Kaur et al. | Detection and prevention of blackhole attacks in wireless sensor networks | |
Hussain et al. | Evaluating network layer selfish behavior and a method to detect and mitigate its effect in MANETs | |
Louta et al. | A survey on reputation-based cooperation enforcement schemes in wireless ad hoc networks | |
Khalil et al. | CTAC: Control traffic tunneling attacks’ countermeasures in mobile wireless networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09728757 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09728757 Country of ref document: EP Kind code of ref document: A2 |