The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: Stealthy attacks are a kind of attacks which injects route fabrication information and producing false identification in network. In this paper, we evaluate these two stealthy attacks against a privacy mechanism as Distinct Authentication Key Approach (DAKA) in MANET. Methods/Statistical Analysis: Wireless networks are becoming the most popular in today communication systems, where users prefer to have wireless connectivity regardless of its geographic location. However, the openness of wireless communications increases the threat to MANET under its conditions. It is very challenging to validate false identify in a stealthy node behaviour as it gives a normal impression and in case of route fabrication they modify the routing path which leads a high number of packet loss. The DAKA provides a Secure Route Discovery Mechanism and data routing through a privacy and certificate authentication methodology. Findings: We evaluate the proposed approach by measuring Packet Delivery Ratio, Avg. End-to-End Delay, Control Overhead and Packet Drop Ratio with varying the number of malicious nodes in a fixed number of nodes and traffic. Application/ Improvements: The simulation experiment result shows successfully alleviation of the malicious nodes and achieves the needed performance.

Keywords

Authentication, MANET, Prevention, Privacy, Stealthy Attacks.
User