Farah Kandah, Yashaswi Singh, Weiyi Zhang and Chonggang Wang Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks Security and Communication Networks 6
We, in this work, show that an adversary can launch a colluding injected attack (CIA) on an arbitrary node thus preventing it from receiving or relaying any packets. Therefore, the attacked node could wrongly be reported as behaving maliciously by the neighborhood monitoring nodes. A monitoring verification (MOVE) scheme is proposed to mitigate the effect of the CIA attack. We show through simulations that our proposed MOVE scheme outperforms previous malicious detection schemes with more accurate decisions.
Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf