International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 66 - Number 20 |
Year of Publication: 2013 |
Authors: Navjot Singh, Rupinder Kaur Cheema |
10.5120/11201-6394 |
Navjot Singh, Rupinder Kaur Cheema . Black Hole Attack in Kerberos Assisted Authentication Protocol. International Journal of Computer Applications. 66, 20 ( March 2013), 24-27. DOI=10.5120/11201-6394
Kaman is the extension of Kerberos protocol; with the use of Kaman nodes in the ad hoc network are authenticated by the secure server. This posed the remedial venture to large number of attacks like replay attack, fabrication, eavesdropping etc Kaman provides secure solution to the problem of secure channel establishment, secure exchange of session keys and prevention of nodes identity forgery. In this paper, we reviewed the Kaman; Kerberos assisted Authentication in Mobile Ad hoc Network. We have also emphasized the problem of black hole that aroused when Kaman protocol is embedded into large network. AODV, on-demand routing protocol had been used to select secure shortest path, when node interacts with an authenticated server for mutual authentication.