Abstract | ||
---|---|---|
Traditionally, a sniffing attack is classified as a passive attack, as it follows all regular protocols without generating any forged messages, simply silently sniffing packets and retrieving valuable information. In mobile ad hoc networks (MANETs), some malicious applications can only work when the resided node is in sniffing mode, and performs the same routing protocol as other normal nodes. This paper proposes a modified Ad hoc On-demand Distance Vector (AODV) routing protocol for the detection and isolation of sniffing nodes in MANETs, so as to prevent such sniffing-based malicious applications. With the proposed protocol, sniffing nodes in MANETs can be found and isolated by their neighboring nodes, ensuring the failure of follow-up attacks. In this study, the NS-2 simulation tool was used to evaluate the designed routing protocol. The results showed that the proposed protocol could effectively detect and isolate sniffing nodes, and would not cause significant network overhead. Copyright (C) 2010 John Wiley & Sons, Ltd. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1002/sec.222 | SECURITY AND COMMUNICATION NETWORKS |
Keywords | Field | DocType |
MANETs,AODV,sniffing-node detection,node isolation,NS-2 (network simulator) | Mobile ad hoc network,Ad hoc On-Demand Distance Vector Routing,Computer science,Computer security,Sniffing,Computer network,Ad hoc wireless distribution service,Wireless Routing Protocol,Optimized Link State Routing Protocol | Journal |
Volume | Issue | ISSN |
4 | 8 | 1939-0114 |
Citations | PageRank | References |
0 | 0.34 | 5 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ming-Yang Su | 1 | 362 | 22.26 |
Sheng-Cheng Yeh | 2 | 83 | 12.55 |