Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks
File version
Author(s)
Muthukkumurasamy, V
Portmann, M
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Peter Harrison etal.
Date
Size
501550 bytes
File type(s)
application/pdf
Location
Bradford, UK
License
Abstract
Wireless networks are being used increasingly in industrial, health care, military and public-safety environments. In these environments security is extremely important because a successful attack against the network may pose a threat to human life. To secure such wireless networks against hostile attack requires both preventative and detective measures.In this paper we propose a novel intrusion detection mechanism that identifies man-in-the-middle and wormhole attacks against wireless mesh networks by external adversaries. A simple modification to the wireless MAC protocol is proposed to expose the presence of an adversary conducting a frame-relaying attack. We evaluate the modified MAC protocol experimentally and show the detection mechanism to have a high detection rate, no false positives and a small computational and communication overhead.
Journal Title
Conference Title
Proceedings - International Conference on Advanced Information Networking and Applications, AINA
Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement
© 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Item Access Status
Note
Access the data
Related item(s)
Subject
Other information and computing sciences not elsewhere classified