CFP last date
20 December 2024
Reseach Article

Detecting MAC Misbehavior Switching Attacks in Wireless Mesh Networks

by Divya Bansal, Dr Sanjeev Sofat, Piyush Pathak, Sanchita Bhoot
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 26 - Number 5
Year of Publication: 2011
Authors: Divya Bansal, Dr Sanjeev Sofat, Piyush Pathak, Sanchita Bhoot
10.5120/3102-4261

Divya Bansal, Dr Sanjeev Sofat, Piyush Pathak, Sanchita Bhoot . Detecting MAC Misbehavior Switching Attacks in Wireless Mesh Networks. International Journal of Computer Applications. 26, 5 ( July 2011), 55-62. DOI=10.5120/3102-4261

@article{ 10.5120/3102-4261,
author = { Divya Bansal, Dr Sanjeev Sofat, Piyush Pathak, Sanchita Bhoot },
title = { Detecting MAC Misbehavior Switching Attacks in Wireless Mesh Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2011 },
volume = { 26 },
number = { 5 },
month = { July },
year = { 2011 },
issn = { 0975-8887 },
pages = { 55-62 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume26/number5/3102-4261/ },
doi = { 10.5120/3102-4261 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:12:02.727285+05:30
%A Divya Bansal
%A Dr Sanjeev Sofat
%A Piyush Pathak
%A Sanchita Bhoot
%T Detecting MAC Misbehavior Switching Attacks in Wireless Mesh Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 26
%N 5
%P 55-62
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

To provide internet connectivity in the areas where it is difficult to lay down Ethernet cables wireless mesh technology emerges as a promising technology. Wireless mesh networks make use of two different radios; one radio is used to provide internet access to the stations and another radio is used to provide wireless connectivity among mesh points for data forwarding. The radio which is used by stations to connect with the MAPs is vulnerable to many greedy MAC misbehaviors. To detect greedy MAC misbehavior many IDS have been designed and implemented for traditional Wireless LANs and MANETs. However our approach is a novel approach as the IDS is implemented on MP thus increasing its detection range. Moreover, this IDS is designed to detect hybrid attacks as well as fast switching attacks which otherwise are quite difficult to detect.

References
  1. Ian F. Akyildiz, Xudong Wang, Weilin Wang, “Wireless Mesh Networks: a Survey”, Elsevier, Computer networks (47) 2005 445-487.
  2. S.Savage, J. Bellardo, “802.11 Denial of Service Attacks: Real Vulnerabilities and Practical Solutions” USENIX Security Symposium, June 2003.
  3. I. Aad, M. Raya, J. Hubaux, “DOMINO: A System to Detect Greedy behavior in IEEE 802.11 Hotspots”, MobiSys, pages 84-97, 2004.
  4. P.Kyasanur, N. Vaidya, “Detecting and Handling of MAC Layer Misbehavior in Wireless Networks”, Dependable Systems and Networks, June 2003
  5. K. Sugantha, S. Shanmugavel, “A Statistical Approach to Detect NAV Attacks at MAC Layer”, unpublished
  6. IEEE Standard for Wireless LAN- Medium Access Control and Physical Layer Specifications, ANSI/IEEE Standard 802.11, 1999 Ediiton (2003)
  7. Chen M., Kuo S., Li P., and Zhu M., Intrusion Detection in Wireless Mesh Networks, CRC Press, 2007.
  8. Caballero J., “Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks: The Routing Problem,” in Proceedings of TKK T-110.5290 Seminar on Network Security, Japan,pp. 1-2, 2006.
  9. Rafsanjani K., Movaghar A., and Koroupi F., “Investigating Intrusion Detection Systems in MANET and Comparing Idss for Detecting Misbehaving Nodes,” in proceedings of World Academy of Science, Engineering and Technology, Canada, pp. 123-128, 2008.
  10. S. Buchegger, J-Y. Le Boudec, ”Performance analysis of the CONFIDANT protocol (Cooperation of Nodes: Fairness in Dynamic Ad-hoc Networks),” 3rd ACM Int. Symp. on Mobile Ad Hoc Networks and Computing, Switzerland, 2002, pp. 226-236.
  11. Geethapriya Thamilarasu, Ramalingam Sridhar, "CIDS: cross-layer intrusion detection system for mobile ad hoc networks", International Journal of Mobile Network Design and Innovation 2009 - Vol. 3, No.1 pp. 10 - 20
  12. Jim Parker, Anand Patwardhan, Anupam Joshi Cross-layer Analysis for Detecting Wireless Misbehavior Consumer Communications and Networking Conference, 2006. CCNC 2006. 3rd IEEE, Vol. 1, Jan. 2006, pp. 6 – 9.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Mesh Network Intrusion detection system Single layer Smart Attacks