{"title":"通过检测未授权和恶意节点来识别MANET中的监控节点","authors":"M. Rafsanjani, A. Movaghar","doi":"10.1109/ITSIM.2008.4631948","DOIUrl":null,"url":null,"abstract":"Mobile ad hoc networks have different characteristics from wired networks. There are new challenges related to security issues that need to be addressed. In this paper, first, critical nodes and authentication in mobile ad hoc networks are discussed. Then, a monitoring nodes selection method with high battery power in these networks is presented. We propose a three-phase detection scheme. In the first phase, unauthorized nodes and in the second phase, malicious nodes are detected. Finally in the third phase, nodes with the largest battery power as monitoring nodes are considered. In the first and the second phases, detection scheme uses non-interactive zero knowledge technique in order to determine the identity of nodes. In this technique, nodes do not need to exchange multiple messages to prove their identities. The proposed scheme is enabled with the main operations of ad hoc networking, which are found at the link and network layers. So, the proposed scheme could improve intrusion detection in the area of security.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Identifying monitoring nodes in MANET by detecting unauthorized and malicious nodes\",\"authors\":\"M. Rafsanjani, A. Movaghar\",\"doi\":\"10.1109/ITSIM.2008.4631948\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile ad hoc networks have different characteristics from wired networks. There are new challenges related to security issues that need to be addressed. In this paper, first, critical nodes and authentication in mobile ad hoc networks are discussed. Then, a monitoring nodes selection method with high battery power in these networks is presented. We propose a three-phase detection scheme. In the first phase, unauthorized nodes and in the second phase, malicious nodes are detected. Finally in the third phase, nodes with the largest battery power as monitoring nodes are considered. In the first and the second phases, detection scheme uses non-interactive zero knowledge technique in order to determine the identity of nodes. In this technique, nodes do not need to exchange multiple messages to prove their identities. The proposed scheme is enabled with the main operations of ad hoc networking, which are found at the link and network layers. So, the proposed scheme could improve intrusion detection in the area of security.\",\"PeriodicalId\":314159,\"journal\":{\"name\":\"2008 International Symposium on Information Technology\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-09-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Symposium on Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITSIM.2008.4631948\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposium on Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITSIM.2008.4631948","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Identifying monitoring nodes in MANET by detecting unauthorized and malicious nodes
Mobile ad hoc networks have different characteristics from wired networks. There are new challenges related to security issues that need to be addressed. In this paper, first, critical nodes and authentication in mobile ad hoc networks are discussed. Then, a monitoring nodes selection method with high battery power in these networks is presented. We propose a three-phase detection scheme. In the first phase, unauthorized nodes and in the second phase, malicious nodes are detected. Finally in the third phase, nodes with the largest battery power as monitoring nodes are considered. In the first and the second phases, detection scheme uses non-interactive zero knowledge technique in order to determine the identity of nodes. In this technique, nodes do not need to exchange multiple messages to prove their identities. The proposed scheme is enabled with the main operations of ad hoc networking, which are found at the link and network layers. So, the proposed scheme could improve intrusion detection in the area of security.