Open Access Open Access  Restricted Access Subscription Access

Prevention of Stealthy Attacks through Privacy Mechanism in Wireless Ad hoc Networks


Affiliations
1 Department of Electronics and Communication Engineering, Kottam Karunakara Reddy Institute of Technology, Kurnool – 518218, Andhra Pradesh, India
2 Department of Electronics and Communication Engineering, JNTUH College of Engineering, JNTUH Hyderabad – 500 085, Telangana, India
 

Objectives: Stealthy attacks are a kind of attacks which injects route fabrication information and producing false identification in network. In this paper, we evaluate these two stealthy attacks against a privacy mechanism as Distinct Authentication Key Approach (DAKA) in MANET. Methods/Statistical Analysis: Wireless networks are becoming the most popular in today communication systems, where users prefer to have wireless connectivity regardless of its geographic location. However, the openness of wireless communications increases the threat to MANET under its conditions. It is very challenging to validate false identify in a stealthy node behaviour as it gives a normal impression and in case of route fabrication they modify the routing path which leads a high number of packet loss. The DAKA provides a Secure Route Discovery Mechanism and data routing through a privacy and certificate authentication methodology. Findings: We evaluate the proposed approach by measuring Packet Delivery Ratio, Avg. End-to-End Delay, Control Overhead and Packet Drop Ratio with varying the number of malicious nodes in a fixed number of nodes and traffic. Application/ Improvements: The simulation experiment result shows successfully alleviation of the malicious nodes and achieves the needed performance.

Keywords

Authentication, MANET, Prevention, Privacy, Stealthy Attacks.
User

Abstract Views: 160

PDF Views: 0




  • Prevention of Stealthy Attacks through Privacy Mechanism in Wireless Ad hoc Networks

Abstract Views: 160  |  PDF Views: 0

Authors

D. V. Srihari Babu
Department of Electronics and Communication Engineering, Kottam Karunakara Reddy Institute of Technology, Kurnool – 518218, Andhra Pradesh, India
P. Chandrasekhar Reddy
Department of Electronics and Communication Engineering, JNTUH College of Engineering, JNTUH Hyderabad – 500 085, Telangana, India

Abstract


Objectives: Stealthy attacks are a kind of attacks which injects route fabrication information and producing false identification in network. In this paper, we evaluate these two stealthy attacks against a privacy mechanism as Distinct Authentication Key Approach (DAKA) in MANET. Methods/Statistical Analysis: Wireless networks are becoming the most popular in today communication systems, where users prefer to have wireless connectivity regardless of its geographic location. However, the openness of wireless communications increases the threat to MANET under its conditions. It is very challenging to validate false identify in a stealthy node behaviour as it gives a normal impression and in case of route fabrication they modify the routing path which leads a high number of packet loss. The DAKA provides a Secure Route Discovery Mechanism and data routing through a privacy and certificate authentication methodology. Findings: We evaluate the proposed approach by measuring Packet Delivery Ratio, Avg. End-to-End Delay, Control Overhead and Packet Drop Ratio with varying the number of malicious nodes in a fixed number of nodes and traffic. Application/ Improvements: The simulation experiment result shows successfully alleviation of the malicious nodes and achieves the needed performance.

Keywords


Authentication, MANET, Prevention, Privacy, Stealthy Attacks.



DOI: https://doi.org/10.17485/ijst%2F2017%2Fv10i16%2F151226