Abstract:
|
Wireless Mesh Networking (WMN) is a promising means of provide low-cost broadband Internet access. In WMN, the static mesh routers (MRs) cooperatively relay each other packets to the Internet Gateway. The routing protocols assume all the nodes in the network to be non-malicious. However, the open architecture of WMNs paves way to malicious attackers who can exploit hidden loopholes in the routing protocol. In this paper, we mainly focus on the vulnerability of the network to a suction attack called blackhole attack. We further explore the possibility of utilizing intelligent agents called Honeypots in detecting such an attack. Honeypots are nothing but roaming virtual software agents that generates a dummy Route Request (RREQ) packets to lure and trap blackhole attackers. We retrieve valuable attack strategies by examining the interaction logs. We finally illustrate the performance of our proposed detection approach by extensive simulation results using the ns-2 simulator.
|