Open Access Open Access  Restricted Access Subscription or Fee Access

Collaborative Authentication and Attack Detection Scheme for Mobile Ad Hoc Network

C. Daniel Nesa Kumar

Abstract


In Mobile Ad Hoc Networks (MANETs), a primary requirement for connection establishment to perform a communication among nodes is that nodes should cooperate with each other. In MANET, the presence of malicious node may lead to serious security concerns; for instance, such nodes may disrupt the routing process. In this situation, preventing and detecting malicious nodes which launch gray hole or collaborative black hole attacks is very challenging. This paper attempts to resolve this issue by designing a Dynamic Anonymous Source Routing (DASR)-with effective Collaborative Authentication and Attack Detection scheme (CAAD). The proposed approach integrates the advantages of both proactive and reactive defense architectures. The CAAD method implements an effective tracking technique to find the attacker.


Keywords


Mobile Adhoc Networks, Collaborative Authentication, Anonymous Routing, Grayhole Attack, Blackhole Attack.

Full Text:

PDF

References


Papadimitratos, Panos, and Zygmunt J. Haas. "Secure routing for mobile ad hoc networks." In the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, January 27-31, 2002, pp. 193-204. 2002.

Kansal, Puneet, Nishant Prabhat, and Amit Rathee. "Black hole attack in Manet." International Journal of Advanced Research in Computer Science and Software Engineering 3, no. 3 (2013).

Banerjee, Sukla. "Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks." In proceedings of the world congress on engineering and computer science, vol. 2008. 2008.

Abolhasan, Mehran, Tadeusz Wysocki, and Eryk Dutkiewicz. "A review of routing protocols for mobile ad hoc networks." Ad hoc networks 2, no. 1 (2004): 1-22.

Wu, Bing, Jianmin Chen, Jie Wu, and Mihaela Cardei. "A survey of attacks and countermeasures in mobile ad hoc networks." Wireless network security (2007): 103-135.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.