E-mail

E-mail a Wiley Online Library Link

Farah Kandah, Yashaswi Singh, Weiyi Zhang and Chonggang Wang Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks Security and Communication Networks 6

Version of Record online: 18 FEB 2013 | DOI: 10.1002/sec.681

Thumbnail image of graphical abstract

We, in this work, show that an adversary can launch a colluding injected attack (CIA) on an arbitrary node thus preventing it from receiving or relaying any packets. Therefore, the attacked node could wrongly be reported as behaving maliciously by the neighborhood monitoring nodes. A monitoring verification (MOVE) scheme is proposed to mitigate the effect of the CIA attack. We show through simulations that our proposed MOVE scheme outperforms previous malicious detection schemes with more accurate decisions.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field

SEARCH