Show simple item record

dc.contributor.convenorPeter Harrison
dc.contributor.authorGlass, S
dc.contributor.authorMuthukkumurasamy, V
dc.contributor.authorPortmann, M
dc.contributor.editorPeter Harrison etal.
dc.date.accessioned2017-05-03T13:58:48Z
dc.date.available2017-05-03T13:58:48Z
dc.date.issued2009
dc.date.modified2010-06-16T05:42:58Z
dc.identifier.isbn9780769536385
dc.identifier.issn1550-445X
dc.identifier.refurihttp://www.inf.brad.ac.uk/~iawan/aina/
dc.identifier.doi10.1109/AINA.2009.131
dc.identifier.urihttp://hdl.handle.net/10072/30825
dc.description.abstractWireless networks are being used increasingly in industrial, health care, military and public-safety environments. In these environments security is extremely important because a successful attack against the network may pose a threat to human life. To secure such wireless networks against hostile attack requires both preventative and detective measures.In this paper we propose a novel intrusion detection mechanism that identifies man-in-the-middle and wormhole attacks against wireless mesh networks by external adversaries. A simple modification to the wireless MAC protocol is proposed to expose the presence of an adversary conducting a frame-relaying attack. We evaluate the modified MAC protocol experimentally and show the detection mechanism to have a high detection rate, no false positives and a small computational and communication overhead.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.format.extent501550 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoeng
dc.publisherIEEE
dc.publisher.placeNew York
dc.relation.ispartofstudentpublicationN
dc.relation.ispartofconferencenameAINA'09: 23rd International Conference on Advanced Information Networking and Applications
dc.relation.ispartofconferencetitleProceedings - International Conference on Advanced Information Networking and Applications, AINA
dc.relation.ispartofdatefrom2009-05-26
dc.relation.ispartofdateto2009-05-29
dc.relation.ispartoflocationBradford, UK
dc.relation.ispartofpagefrom530
dc.relation.ispartofpageto538
dc.rights.retentionY
dc.subject.fieldofresearchOther information and computing sciences not elsewhere classified
dc.subject.fieldofresearchcode469999
dc.titleDetecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks
dc.typeConference output
dc.type.descriptionE1 - Conferences
dc.type.codeE - Conference Publications
gro.rights.copyright© 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
gro.date.issued2009
gro.hasfulltextFull Text
gro.griffith.authorMuthukkumarasamy, Vallipuram


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record