Open Access
Subscription Access
Open Access
Subscription Access
Clone Detection in Manet Using Routing Information Protocol
Subscribe/Renew Journal
An extensive helplessness of wireless networks in exacting the Mobile Ad-Hoc Network (MANET) is their vulnerability to node compromise and physical capture attacks. Detecting replication attacks is a nontrivial problem in MANETs due to the challenges resulted from node mobility, cloned and compromised node collusion, and the outsized number and extensive of the replicas. It has two replication detection schemes, Time Domain Detection (TDD) and Space Domain Detection (SDD). The theoretical analysis indicates that TDD and SDD provide high detection accuracy and excellent resilience against smart and colluding replicas. They have no restriction on the number and distribution of replicas, and incur low communication and computation overhead.According to theoretical analysis, for validating the path to occur any interference before transmitting the data from source to destinationthe RIP Protocol, TDD and SDD are the only approaches that support mobile networks that places no restrictions on the number and distribution of the cloned frauds and on whether the replicas collude or not.
Keywords
TDD (Time Domain Detection), SDD (Space Domain Detection), RIP (Routing Information Protocol), MANET.
Subscription
Login to verify subscription
User
Font Size
Information
- Baisakh, P. N. R. & Kumar, S. (2012). Energy Conscious DSR in MANET. 2nd IEEE International Conference on Parallel, (December, 784-789).
- Choi, H., Zhu, S. & La Porta, T. F. (2007). Detecting Node Clones in Sensor Networks. (Secure Comm 07), (pp. 341-350).
- Ganeriwal, S. & Srivastava, M. B. (2004). Reputation based Framework for High Integrity Sensor Networks. University of California.
- Ho, J., Wright, M. & Das, S. K. (2009). Fast Detection of Replica Node Attacks in Sensor Networks Using Sequential Analysis. Proceedings of IEEE INFOCOM.
- Liu, A., Li, L., Yu, H. & Zhang, D. (2007). An Energy efficient MAC Protocol Based on Routing Information for Wireless Sensor Networks. IEEE Communications Society, (March, pp. 458-462).
- Murakami, R., Yamai, N. & Okayama, K. (2010). A MAC address Relaying NAT Router for PC Identification from Outside of a LAN. 10th Annual International Symposium on Applications and the Internet, (pp.237-240).
- Sheela, D., Priyadarshini. & Mahadevan, G. (2011). Efficient Approach to Detect Clone Attacks in Wireless Sensor Networks, Electronics Computer Technology (ICECT). 3rd International Conference, (April, 5, pp.194-198).
- Vincenzo, L., Conti, M., Di Pietro, R., Mancini, L. V. & Mei, A. (2011). Distributed Detection of Clone Attacks in Wireless Sensor Networks. IEEE Transactions on Dependable & Secure Computing, September/October, 8(5), 685-698.
- Wen, H., Luo, J. & Zhou., I. (2011). Lightweight and Effective Detection Scheme for Node Clone Attack in Wireless Sensor Networks. IET Wireless Sensors.
- Xing, K., Liu, F., Cheng, X. & Du, D. H. C. (2008). Real-time Detection of Clone Attacks in Wireless Sensor Networks. 28th International Conference on Distributed Computing Systems (pp. 3-10).
- Yang, Y., Wang, X., Zhu, S. & Cao, G. (2004). SDAP: A Secure Hop by Hop Data Aggregation Protocol for Sensor Networks. University of California.
- Zeng, Y., Cao, J., Zhang, S., Guo, S. & Xie, L. (2010). Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks. IEEE Journals on selected Areas in Communications, June, 28(5), 677-691.
- Kumar, M. & Mishra, R. (2012). An overview of MANET: History, challenges & applications. Indian Journal of Computer Science & Engineering, February-March, 3(1), 121.
- Wang, M., Lamont, L. & Mason, P. (2005). An Effective Intrusion Detection approach for OLSR MANET Protocol. IEEE ICNP workshop.
- Wang, C.Y., Wu, C. J., Chen, G. N. & Hwang, R. H. (2005). p-MANET: Efficient Power Saving Protocol for Multi-Hop Mobile Ad Hoc Networks. 3rd International Conference on Information, Technology & Management.
- Chin, K., Lowe, D. & Lau, W. (2005). Routing in MANETs with Address Conflicts. The 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (July, pp. 225-236)
Abstract Views: 440
PDF Views: 0