We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Article:Efficient Content Authentication in Ad-Hoc Networks- Mitigating DDoS Attacks

by Anuj Joshi, Krishna Kant Agrawal, Dr. Deepak Arora, Shashwat Shukla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 23 - Number 4
Year of Publication: 2011
Authors: Anuj Joshi, Krishna Kant Agrawal, Dr. Deepak Arora, Shashwat Shukla
10.5120/2875-3738

Anuj Joshi, Krishna Kant Agrawal, Dr. Deepak Arora, Shashwat Shukla . Article:Efficient Content Authentication in Ad-Hoc Networks- Mitigating DDoS Attacks. International Journal of Computer Applications. 23, 4 ( June 2011), 35-39. DOI=10.5120/2875-3738

@article{ 10.5120/2875-3738,
author = { Anuj Joshi, Krishna Kant Agrawal, Dr. Deepak Arora, Shashwat Shukla },
title = { Article:Efficient Content Authentication in Ad-Hoc Networks- Mitigating DDoS Attacks },
journal = { International Journal of Computer Applications },
issue_date = { June 2011 },
volume = { 23 },
number = { 4 },
month = { June },
year = { 2011 },
issn = { 0975-8887 },
pages = { 35-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume23/number4/2875-3738/ },
doi = { 10.5120/2875-3738 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:09:20.003039+05:30
%A Anuj Joshi
%A Krishna Kant Agrawal
%A Dr. Deepak Arora
%A Shashwat Shukla
%T Article:Efficient Content Authentication in Ad-Hoc Networks- Mitigating DDoS Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 23
%N 4
%P 35-39
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the emergence of mobile ad hoc networks it is now possible to access network accessing and communicate data in an area where no fixed infrastructure exists or existing infrastructure is not available. Since in ad hoc networks, the exact copies of the same content are stored at various locations. Therefore in order to prevent from various attacks based on the content; it becomes important to have some security solutions. In this paper, we propose an efficient content authentication method in ad hoc network. Foremost, the challenges in ad hoc networks have been mentioned in this paper. This paper focuses on secure packet forwarding in ad hoc networks and proposes a new solution based on observation by all the neighboring nodes to mitigate the effects of adverse situations caused by malicious nodes. This prevention mechanism exploits all well-behaving nodes’ local knowledge to bypass misbehaving nodes, evaluate path quality and choose the most reliable path for data forwarding. In this paper, a new solution for mobile ad hoc networks based on observation by all the neighboring nodes is presented.

References
  1. X. Zhang, S. Chen, and R. Sandhu. Enhancing data authenticity and integrity in ad hoc systems. IEEE Internet Computing, pages 42–49, November–December 2005.
  2. F. Zambonelli, M. Gleizesb, M. Mameia, and R. Tolksdorf. Spray computers: Explorations in self-organization. Pervasive and Mobile Computing, 1:1–20, March 2005.
  3. V. Srinivasan, P. Nuggehalli, C. Chiasserini, and R. Rao. Cooperation in wireless ad hoc networks. In Proceedings of IEEE Infocom, 2003.
  4. L. Buttyán and J.-P. Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications, 8:579–592, 2003.
  5. J. Lopez, R. Oppliger, and G. Pernul. Authentication and authorization infrastructures (aais): A comparative survey. Computer Communications, 27(16):1608–1616, October 2004.
  6. V. Paxson. An analysis of using reflectors for distributed denial-of-service attacks. Computer Communication Review 31(3), July 2001.
  7. E. Palomar, J.M. Estevez-Tapiador, J.C. Hernandez-Castro, and A. Ribagorda. Secure content access and replication in pure ad hoc networks Computer Communications, 31(2):266–279, February 2008.
  8. B. Zhu, S. Jajodia, and M.S. Kankanhalli. Building trust in peer-topeer systems: a review. International Journal of Security and Networks, 1(1/2):103–112, 2006.
  9. H. Luo and S. Lu. Ubiquitous and robust authentication services for ad hoc wireless networks. Technical report, 2000.
  10. The Network Simulator - ns-2. http://www.isi.edu/nsnam/ns/index.html.
  11. Panagiotis Papadimitratos and Zygmunt J. Haas, “Secure routing for mobile ad hoc networks”, In Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31, 2002
  12. Lidong Zhou and Zygmunt J. Haas, “Securing ad hoc networks”, IEEE network, special issue on network security, November/December, 1999.
  13. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” Proceeding of MOBICOM, Aug 2000.
  14. P. Papadimitrators, Z. J. Haas, “Secure message transmission in mobile ad hoc networks”, Ad Hoc Networks (2003) 193-209.
  15. P. Michiardi, R. Molva, “Simulation-based analysis of security exposures in mobile ad hoc networks”, European Wireless Conference, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Ad hoc Networks DDoS Misbehaving Nodes Optimal Route