ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

Locating the attacker of wormhole attack by using the honeypot

Keerthi, Divya Sai T and Venkataram, Pallapa (2012) Locating the attacker of wormhole attack by using the honeypot. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 25-27 June 2012, Liverpool.

[img] PDF
Tru_Secu_Priv_Com_Comm_1175_2012.pdf - Published Version
Restricted to Registered users only

Download (889kB) | Request a copy
Official URL: http://dx.doi.org/10.1109/TrustCom.2012.196


Mobile Ad hoc Networks (MANETs) having strikingly superior features also come with notable disadvantage and troubles and the most exigent amongst all being security related issues. Such an ringent network dexterously pave approach for the malicious nodes. Hence providing security is a tedious task. For such a dynamic environment, a security system which dynamically observes the attacker's plans and protect the highly sophisticated resources is in high demand. In this paper we present a method of providing security against wormhole attacks to a MANET by learning about the environment dynamically and adapting itself to avoid malicious nodes. We accomplish this with the assistance of Honeypot. Our method predicts the wormhole attack that may take place and protect the resources well-in advance. Also it cleverly deal with the attacker by using previous history and different type of messages to locate the attacker. Several experiments suggest that the system is accurate in handling wormhole attack.

Item Type: Conference Paper
Publisher: IEEE
Additional Information: Copyright of this article belongs to IEEE.
Keywords: Mobile ad Hoc Networks; Security; Honeypots; History Database; Attacker Trace-Back
Department/Centre: Division of Electrical Sciences > Electrical Communication Engineering
Date Deposited: 18 Dec 2013 10:01
Last Modified: 18 Dec 2013 10:01
URI: http://eprints.iisc.ac.in/id/eprint/48024

Actions (login required)

View Item View Item