Show simple item record

dc.contributor.convenorPeter Harrisonen_AU
dc.contributor.authorGlass, Stephenen_US
dc.contributor.authorMuthukkumarasamy, Vallipuramen_US
dc.contributor.authorPortmann, Mariusen_US
dc.contributor.editorPeter Harrison etal.en_US
dc.date.accessioned2017-04-24T11:12:42Z
dc.date.available2017-04-24T11:12:42Z
dc.date.issued2009en_US
dc.date.modified2010-06-16T05:42:58Z
dc.identifier.refurihttp://www.inf.brad.ac.uk/~iawan/aina/en_AU
dc.identifier.doi10.1109/AINA.2009.131en_AU
dc.identifier.urihttp://hdl.handle.net/10072/30825
dc.description.abstractWireless networks are being used increasingly in industrial, health care, military and public-safety environments. In these environments security is extremely important because a successful attack against the network may pose a threat to human life. To secure such wireless networks against hostile attack requires both preventative and detective measures.In this paper we propose a novel intrusion detection mechanism that identifies man-in-the-middle and wormhole attacks against wireless mesh networks by external adversaries. A simple modification to the wireless MAC protocol is proposed to expose the presence of an adversary conducting a frame-relaying attack. We evaluate the modified MAC protocol experimentally and show the detection mechanism to have a high detection rate, no false positives and a small computational and communication overhead.en_US
dc.description.peerreviewedYesen_US
dc.description.publicationstatusYesen_AU
dc.format.extent501550 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglishen_US
dc.language.isoen_AU
dc.publisherIEEEen_US
dc.publisher.placeNew Yorken_US
dc.relation.ispartofstudentpublicationNen_AU
dc.relation.ispartofconferencenameAINA'09: 23rd International Conference on Advanced Information Networking and Applicationsen_US
dc.relation.ispartofconferencetitleProceedings of the International Conference on Advanced Information Networking and Applications, 2009en_US
dc.relation.ispartofdatefrom2009-05-26en_US
dc.relation.ispartofdateto2009-05-29en_US
dc.relation.ispartoflocationBradford, UKen_US
dc.rights.retentionYen_AU
dc.subject.fieldofresearchInformation and Computing Sciences not elsewhere classifieden_US
dc.subject.fieldofresearchcode089999en_US
dc.titleDetecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networksen_US
dc.typeConference outputen_US
dc.type.descriptionE1 - Conference Publications (HERDC)en_US
dc.type.codeE - Conference Publicationsen_US
gro.rights.copyrightCopyright 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.en_AU
gro.date.issued2009
gro.hasfulltextFull Text


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record