2018
DOI: 10.1186/s13638-018-1143-0
|View full text |Cite
|
Sign up to set email alerts
|

Identity attack detection system for 802.11-based ad hoc networks

Abstract: Due to the lack of centralized identity management and the broadcast nature of wireless ad hoc networks, identity attacks are always tempting. The attackers can create multiple illegitimate (arbitrary or spoofed) identities on their physical devices for various malicious reasons, such as to launch Denial of Service attacks and to evade detection and accountability. In one scenario, the attacker creates more than one identity on a single physical device, which is called a Sybil attack. In the other one, the att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
25
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(25 citation statements)
references
References 34 publications
(49 reference statements)
0
25
0
Order By: Relevance
“…Whereas, the resource testingbased solutions are usually based on an assumption related to restrictive hardware, such as network interface card, memory, and computation power; but hardware resources are cheap to buy now-a-days and attackers can exploit extra hardware to counteract the detection system. Finally, the localization-based solutions are more promising than the other two [31]. They use location-based information, such as signal strength, and sometimes use extra hardware, such as GPS and directional antennae to detect Sybil attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Whereas, the resource testingbased solutions are usually based on an assumption related to restrictive hardware, such as network interface card, memory, and computation power; but hardware resources are cheap to buy now-a-days and attackers can exploit extra hardware to counteract the detection system. Finally, the localization-based solutions are more promising than the other two [31]. They use location-based information, such as signal strength, and sometimes use extra hardware, such as GPS and directional antennae to detect Sybil attacks.…”
Section: Related Workmentioning
confidence: 99%
“…For detecting replica attack in 802.11-based ad hoc networks, Faisal et al 5 proposed a hybrid approach of local and global detection. In local scheme, the received signal strength information (RSSI) is used to calculate distance between nodes to detect replicas from different locations based on the principle of each location being bound with a unique identity.…”
Section: Related Workmentioning
confidence: 99%
“…Not only the generation of replicas itself poses an aggressive behavior, but also the replicas can enable other vicious attacks ranging from data injection to routing loop creation. 5 In VANETs, data are also transmitted through an open and shared communication media, the same as in WSNs. In addition, vehicular nodes are widely distributed and the network topology is rapidly changing, 6,7 so that it is difficult to manage all identities in a centralized way.…”
Section: Introductionmentioning
confidence: 99%
“…The work carried out by Sekaran and Parasuraman [14] have deployed a cryptographic scheme for performing secure routing considering the mobility aspect of the wireless adhoc network. Study towards detection of identity-based intrusion was carried out by Faisal et al, [15] where the focus was offered towards resisting Sybil attack as well as replication attack. Usage of genetic algorithm as well as detection using bait has been carried out using Nithya et al, [16] using simulation-based study.…”
Section: Introductionmentioning
confidence: 99%