Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Collaborative Authentication and Attack Detection Scheme for Mobile Ad Hoc Network


Affiliations
1 Department of Computer Science, Hindusthan College of Arts and Science, Coimbatore, Tamil Nadu, India
2 Department of Information Technology (PG), Hindusthan College of Arts and Science, Coimbatore, Tamil Nadu, India
     

   Subscribe/Renew Journal


In Mobile Ad Hoc Networks (MANETs), a primary requirement for connection establishment to perform a communication among nodes is that nodes should cooperate with each other. In MANET, the presence of malicious node may lead to serious security concerns; for instance, such nodes may disrupt the routing process. In this situation, preventing and detecting malicious nodes which launch gray hole or collaborative black hole attacks is very challenging. This paper attempts to resolve this issue by designing a Dynamic Anonymous Source Routing (DASR)-with effective Collaborative Authentication and Attack Detection scheme (CAAD). The proposed approach integrates the advantages of both proactive and reactive defense architectures. The CAAD method implements an effective tracking technique to find the attacker.


Keywords

Mobile Adhoc Networks, Collaborative Authentication, Anonymous Routing, Grayhole Attack, Blackhole Attack.
User
Subscription Login to verify subscription
Notifications
Font Size

  • Papadimitratos, Panos, and Zygmunt J. Haas. "Secure routing for mobile ad hoc networks." In the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, January 27-31, 2002, pp. 193-204. 2002.
  • Kansal, Puneet, Nishant Prabhat, and Amit Rathee. "Black hole attack in Manet." International Journal of Advanced Research in Computer Science and Software Engineering 3, no. 3 (2013).
  • Banerjee, Sukla. "Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks." In proceedings of the world congress on engineering and computer science, vol. 2008. 2008.
  • Abolhasan, Mehran, Tadeusz Wysocki, and Eryk Dutkiewicz. "A review of routing protocols for mobile ad hoc networks." Ad hoc networks 2, no. 1 (2004): 1-22.
  • Wu, Bing, Jianmin Chen, Jie Wu, and Mihaela Cardei. "A survey of attacks and countermeasures in mobile ad hoc networks." Wireless network security (2007): 103-135.

Abstract Views: 170

PDF Views: 0




  • Collaborative Authentication and Attack Detection Scheme for Mobile Ad Hoc Network

Abstract Views: 170  |  PDF Views: 0

Authors

C. Daniel Nesa Kumar
Department of Computer Science, Hindusthan College of Arts and Science, Coimbatore, Tamil Nadu, India
V. Saravana
Department of Information Technology (PG), Hindusthan College of Arts and Science, Coimbatore, Tamil Nadu, India

Abstract


In Mobile Ad Hoc Networks (MANETs), a primary requirement for connection establishment to perform a communication among nodes is that nodes should cooperate with each other. In MANET, the presence of malicious node may lead to serious security concerns; for instance, such nodes may disrupt the routing process. In this situation, preventing and detecting malicious nodes which launch gray hole or collaborative black hole attacks is very challenging. This paper attempts to resolve this issue by designing a Dynamic Anonymous Source Routing (DASR)-with effective Collaborative Authentication and Attack Detection scheme (CAAD). The proposed approach integrates the advantages of both proactive and reactive defense architectures. The CAAD method implements an effective tracking technique to find the attacker.


Keywords


Mobile Adhoc Networks, Collaborative Authentication, Anonymous Routing, Grayhole Attack, Blackhole Attack.

References