A New Statistical Method for Wormhole Attack Detection in MANETs
Title | A New Statistical Method for Wormhole Attack Detection in MANETs |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | As'adi, H., Keshavarz-Haddad, A., Jamshidi, A. |
Conference Name | 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) |
Keywords | Ad hoc networks, composability, delays, MANET, MANET Attack Detection, Metrics, Microsoft Windows, mobile ad hoc networks, mobile computing, mobile wireless nodes, NS3 simulator, number of neighbors, number of new neighbors, pubcrawl, Resiliency, Routing protocols, security attacks, statistical methods, SWAN, telecommunication security, Training, Wireless sensor networks, wormhole attack, wormhole attack detection |
Abstract | Mobile ad hoc networks (MANETs) are a set of mobile wireless nodes that can communicate without the need for an infrastructure. Features of MANETs have made them vulnerable to many security attacks including wormhole attack. In the past few years, different methods have been introduced for detecting, mitigating, and preventing wormhole attacks in MANETs. In this paper, we introduce a new decentralized scheme based on statistical metrics for detecting wormholes that employs "number of new neighbors" along with "number of neighbors" for each node as its parameters. The proposed scheme has considerably low detection delay and does not create any traffic overhead for routing protocols which include neighbor discovery mechanism. Also, it possesses reasonable processing power and memory usage. Our simulation results using NS3 simulator show that the proposed scheme performs well in terms of detection accuracy, false positive rate and mean detection delay. |
URL | https://ieeexplore.ieee.org/document/8546943 |
DOI | 10.1109/ISCISC.2018.8546943 |
Citation Key | asadi_new_2018 |
- number of new neighbors
- wormhole attack detection
- wormhole attack
- wireless sensor networks
- Training
- telecommunication security
- SWAN
- statistical methods
- security attacks
- Routing protocols
- Resiliency
- pubcrawl
- Ad hoc networks
- number of neighbors
- NS3 simulator
- mobile wireless nodes
- mobile computing
- mobile ad hoc networks
- microsoft windows
- Metrics
- MANET Attack Detection
- MANET
- delays
- composability