CFP last date
20 December 2024
Reseach Article

Performance Analysis of Malicious Node Aware Routing for MANET using Two-Hop Authentication

by Sanjeev Rana, Manpreet Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 25 - Number 3
Year of Publication: 2011
Authors: Sanjeev Rana, Manpreet Singh
10.5120/3012-4064

Sanjeev Rana, Manpreet Singh . Performance Analysis of Malicious Node Aware Routing for MANET using Two-Hop Authentication. International Journal of Computer Applications. 25, 3 ( July 2011), 17-24. DOI=10.5120/3012-4064

@article{ 10.5120/3012-4064,
author = { Sanjeev Rana, Manpreet Singh },
title = { Performance Analysis of Malicious Node Aware Routing for MANET using Two-Hop Authentication },
journal = { International Journal of Computer Applications },
issue_date = { July 2011 },
volume = { 25 },
number = { 3 },
month = { July },
year = { 2011 },
issn = { 0975-8887 },
pages = { 17-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume25/number3/3012-4064/ },
doi = { 10.5120/3012-4064 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:10:50.270105+05:30
%A Sanjeev Rana
%A Manpreet Singh
%T Performance Analysis of Malicious Node Aware Routing for MANET using Two-Hop Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 25
%N 3
%P 17-24
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The inherent features of the MANET [1] make it vulnerable to a wide range of attacks. There is no guarantee that a communication path is free from malicious and compromised nodes which deliberately wish to disrupt the network communication. In this paper, we present a security mechanism that provides message integrity, mutual authentication and two-hop authentication mechanism without the assistance of online certification authority. Our mechanism not only prevents identity impersonation, replay attacks, but also enables node to regulate the behavior of its neighbors to foil active attacks. The effectiveness of the proposed scheme is analyzed to DSR and OLSR routing using simulator NS2.34.

References
  1. C. Siva Ram Murthy and B. S. Manoj, “Ad Hoc Wireless Networks: Architectures and Protocols” Prentice Hall, 2004.
  2. Johnson DB, Maltz DA. “Dynamic source routing in adhoc wireless networks in Mobile Computing” Imielinski T, Korth H (Eds). Kluwer Academic Publishers: Boston, 1996; 153–181.
  3. Perkins CE, Royer EM. “Ad-hoc on-demand distance vector routing” Proceedings of 2nd IEEE Workshop on Mobile Computer Systems and Applications, February 1999.
  4. Karlof C, Wagner D. “Secure routing in wireless sensor networks: Attacks and countermeasures” Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications May 2003.
  5. Douceur J. “The sybil attack” Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS02), March 2002.
  6. Burg A. “Ad hoc network specific attacks” Seminar Adhoc networking: Concepts, Applications, and Security. Technische Universitat Munchen, ‘2003.
  7. Hu YC, Perrig A, Johnson DB. “Packet leashes: A defence against wormhole attacks in wireless ad hoc networks” Technical Report TR01-384, Department of Computer Science, Rice University, December 2001.
  8. Michiardi P. “Cooperation enforcement and network security mechanisms for mobile ad-hoc networks” Ph. D. thesis, Ecole nationale supe´rieure des telecommunications, December 2004.
  9. Jøsang A. “The right type of trust for distributed systems” Proceedings of ACM New Security Paradigms Workshop, September 1996.
  10. Sergio Marti.T.J. Giuli, Kevin Lai, and Mary Baker. “Mitigating routing misbehaviour in Mobile ad hoc networks” Proceedings of MOBICOM 2000. Pages 255-265, 2000.
  11. Sonja Buchegger and Jean-Yves Le Boudec: “Performance analysis of the CONFIDANT protocol” Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing’02. p.p:226 – 236
  12. P. Michiardi and R. Molva. Preventing denial of service And selfishness in adhoc networks. In Working Session on Security in Ad Hoc Networks, Lausanne, Switzerland, June 2002.
  13. P. Michiardi and R. Molva. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the 6th IFIP Communications and Multimedia Security Conference, pages 107–121, Portorosz, Slovenia, September 2002.
  14. C. Adjih, D. Raffo, and P Muhlethaler, “Attack against OLSR: Distributed Key Management for security”, 2nd OLSR interop/ Workshop, France, July 28-29, 2005
  15. D. Raffo,” Security Schemes for OLSR protocol in Ad hoc Network”, Ph.D thesis, universite Paris, 2005
  16. B. Kannhavong, H. Nakayama, N. Kato, A. Jamalipour and Y. Nemoto, “Analysis of Node Isolation Attack against OLSR-based Mobile Ad Hoc Network,” 7th international symposium on computer networks (ISCN) pp 30-35, IStabul, Turkey, June 2006.
  17. Hu, Y.-C., Perrig, A., Johnson, D.B.: Aridane: A secure on-demand routing protocol for ad-hoc networks. In: The Proceeding of 8th ACM International Conference on Mobile Computing and Networking (September 2002)
  18. Kim, J., Tsudik, G.: Securing Route Discovery in DSR. In: IEEE Mobiquitous 2005 (July 2005)
  19. Venkatraman, L., Agarwal, D.P.: An Optimised Inter-Router Authentication Scheme for Ad Hoc networks. In: Proceeding of the 13th International Conference on Wireless Communication, Calgary, Canada, July 9-11, p. 129 (2001)
  20. Zapata, M.G.: Secure Adhoc On-Demand Distance Vector Routing (SAODV), Mobile Adhoc Networking Group Internet Draft (October 2001) draft-guerrero-manet-saodv-00.txt
  21. J.Hubaux, L.Buttyan, and Sc.Capkun.: The quest for security in Mobile Ad hoc Networks. In proceedings of the ACM Symposium on Mobile Ad hoc Networking and Computing (MobiHOC) 2001
  22. Kevin Fall, Kannan Varadhan: The ns manual, http://www.isi.edu/nsnam/ns/ doc/index.html
Index Terms

Computer Science
Information Sciences

Keywords

Malicious nodes DSR OLSR Authentication MANETs