Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks

Loading...
Thumbnail Image
File version
Author(s)
Glass, S
Muthukkumurasamy, V
Portmann, M
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)

Peter Harrison etal.

Date
2009
Size

501550 bytes

File type(s)

application/pdf

Location

Bradford, UK

License
Abstract

Wireless networks are being used increasingly in industrial, health care, military and public-safety environments. In these environments security is extremely important because a successful attack against the network may pose a threat to human life. To secure such wireless networks against hostile attack requires both preventative and detective measures.In this paper we propose a novel intrusion detection mechanism that identifies man-in-the-middle and wormhole attacks against wireless mesh networks by external adversaries. A simple modification to the wireless MAC protocol is proposed to expose the presence of an adversary conducting a frame-relaying attack. We evaluate the modified MAC protocol experimentally and show the detection mechanism to have a high detection rate, no false positives and a small computational and communication overhead.

Journal Title
Conference Title

Proceedings - International Conference on Advanced Information Networking and Applications, AINA

Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement

© 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Item Access Status
Note
Access the data
Related item(s)
Subject

Other information and computing sciences not elsewhere classified

Persistent link to this record
Citation