CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Study of Attacks in MANET, Attacks on AES, Cryptographically Generated Addresses (CGAs) Methods and Possible Alleviation in IPV6 over MANET Area

by Kavita Tukaram Patil, Manoj E. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 96 - Number 1
Year of Publication: 2014
Authors: Kavita Tukaram Patil, Manoj E. Patil
10.5120/16762-6674

Kavita Tukaram Patil, Manoj E. Patil . Study of Attacks in MANET, Attacks on AES, Cryptographically Generated Addresses (CGAs) Methods and Possible Alleviation in IPV6 over MANET Area. International Journal of Computer Applications. 96, 1 ( June 2014), 35-42. DOI=10.5120/16762-6674

@article{ 10.5120/16762-6674,
author = { Kavita Tukaram Patil, Manoj E. Patil },
title = { Study of Attacks in MANET, Attacks on AES, Cryptographically Generated Addresses (CGAs) Methods and Possible Alleviation in IPV6 over MANET Area },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 96 },
number = { 1 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 35-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume96/number1/16762-6674/ },
doi = { 10.5120/16762-6674 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:20:41.173484+05:30
%A Kavita Tukaram Patil
%A Manoj E. Patil
%T Study of Attacks in MANET, Attacks on AES, Cryptographically Generated Addresses (CGAs) Methods and Possible Alleviation in IPV6 over MANET Area
%J International Journal of Computer Applications
%@ 0975-8887
%V 96
%N 1
%P 35-42
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The mobile ad hoc network (MANET) has attracted a lot of attention due to the characteristic of an infrastructure-less construction and multi-hop communication. In MANET, security is major issue, hackers has aimed to disrupt security in the form of IP spoofing or to produce a forged route. In the advancement of networks to IP version 6, appreciating the same protocol would guarantee the achievement and portability of MANETs. Two benefits of approving IPv6 are improved support for security and mobility. To accomplish these goals an innovative mechanism called Cryptographically Generated Addresses (CGAs) were announced. CGAs were primarily comprised in SEcure Neighbor Discovery (SEND) protocol to guard against IP address spoofing and attacks. In this review paper, attacks in MANET, attacks on AES, and various CGA methods are studied. Though, the CGA is hopeful security technique for use with IPV6 addresses it still exhibits vulnerabilities and weaknesses if, used with SHA-I(secure Hash algorithm) algorithm. It is yet prone to privacy related attacks. So, use such method that can be secure and efficient to CGA in IPV6 over MANET area. This paper provides necessary solution to resolve these problems.

References
  1. P. Goyal, V. Parmar, and R. Rishi, "Manet: Vulnerabilities, Challenges, Attacks, Application," IJCEM International Journal of Computational Engineering and Management, vol. 11. [Online]. Available: http://www. IJCEM. org
  2. M. Chinta, "Mobile ad hoc Networks (MANETs): Overview, Properties of a MANET, spectrum of MANET, applications, routing and various routing algorithms, security in MANET," Mobile Computing Unit-7 Mobile Ad Hoc Networks (MANETs), pp. 1–23. [Online]. Available: http://www. jntuworld. com
  3. I. Chlamtac, M. Conti, and J. J. -N. Liu, "Mobile ad hoc networking: imperatives and challenges. " Ad Hoc Networks, vol. 1, no. 1, pp. 13–64, 2003. [Online]. Available:http://dblp. unitrier. de/db/journals/adhoc/adhoc1. html#ChlamtacCL03
  4. D. Durich and D. Montesinos, "AD-HOC NETWORKS," Telecommunication systems and networks.
  5. M. W. Murhammer and O. Atakan, "TCP/IP Tutorial and Technical Overview," International Technical Support Organization. [Online]. Available: http://www. redbooks. ibm. com.
  6. A. Alsadeh, H. Ra?ee, and C. Meinel, "Cryptographically Generated Addresses (CGAs): Possible Attacks and Proposed Mitigation Approaches," Computer and Information Technology, International Conference on, vol. 0, pp. 332–339, 2012.
  7. F. J. Galera, P. M. Ruiz, A. F. Gomez-skarmeta, and A. Kassler, "Security Extensions to MMARP Through Cryptographically Generated Addresses. " in Lecture Notes on Informatics, 2005, pp. 339–342.
  8. N. Hakiem, M. U. Siddiqi, and H. M. Ra?q, "Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identi?cation in an Enterprise Local Area Network," International Journal of Network Security, vol. 0, pp. 1–8, Nov 2013.
  9. A. Jagadev and V. Senapati, "Advanced Encryption Standard (AES) Implementation," Department of Electronics and Communication Engineering National Institute of Technology, Rourkela, May 2009.
  10. M. D. Saravanan and M. I. Anbumuthu, "A Novel Node Security Mechanism For Mobile Ad-Hoc Network," International Conference on Engineering Technology and Science (ICETS'14), vol. 3, pp. 463–467, Feb 2014.
  11. S. Sahmoud, W. Elmasry, and S. Abudalfa, "Enhancement the Security of AES Against Modern Attacks by Using Variable Key Block Cipher. " International Arab Journal of e-Technology, vol. 3, no. 1, pp. 17–26, 2013. [Online]. Available: http://dblp. unitrier. de/db/journals/iajet/iajet3. html#SahmoudEA13
  12. A. K. Rai, R. R. Tewari, and S. K. Upadhyay, "Different Types of Attacks on Integrated MANET-Internet Communication," pp. 265–274, 2009.
  13. K. Sahadevaiah and P. R. P. V. G. D, "Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks," Network Protocols and Algorithms, vol. 03,no. 4, pp. 265–274, 2011. [Online]. Available: http://www. macrothink. org/npa
  14. A. Hamieh and J. Ben-Othman, "Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution," in IEEE International Conference on Communications (ICC), 2009. [Online]. Available:http://ieeexplore. ieee. org/xpls/absall. jsp?arnumber=5198912
  15. Y. chun Hu, A. Perrig, and D. B. Johnson, "Wormhole Attacks in Wireless Networks," IEEE Journal on Selected Areas in Communications, vol. 24, pp. 370–380, 2006.
  16. N. Mistry, D. C. Jinwala, and M. Zaveri, "Improving AODV Protocol Against Blackhole Attacks," in Proceedings of the International Multi Conference of Engineers and Scientists.
  17. D. M. Shila, Y. Cheng, and T. Anjali, "Channel Aware Detection of Gray Hole Attacks in Wireless Mesh Networks. " in GLOBECOM. IEEE, 2009, pp. 1–6. [Online]. Available:http://dblp. unitrier. de/db/ conf/globecom/globecom2009. html#ShilaCA09
  18. A. Tangpong, G. Kesidis, H. -Y. Hsu, and A. R. Hurson,"Robust Sybil Detection for MANETs. " in ICCCN. IEEE,2009, pp. 1–6. [Online]. Available: http://dblp. unitrier. de/db/conf/icccn/icccn2009. html#TangpongKHH09.
  19. T. Thumthawatworn, T. Yeophantong, and P. Sirikriengkrai,"Adaptive sinkhole detection on wireless ad hoc networks," in Aerospace Conference, 2006 IEEE. IEEE, 2006, pp. 10–pp.
  20. M. M. Rana, K. E. U. Ahmed, N. R. Sumel, M. S. Alam, and L. Sarkar, "Security in Ad Hoc Networks: A Location Based Impersonation Detection Method," Computer Engineering and Technology, International Conference on, vol. 2, pp. 380–384, 2009.
  21. C. Crepeau, C. R. Davis, and M. Maheswaran, "A Secure MANET routing protocol with resilience against byzantine behaviours of malicious or sel?sh nodes," in Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 02, ser. AINAW '07. Washington, DC,USA: IEEE Computer Society, 2007, pp. 19–26. [Online]. Available:http://dx. doi. org/10. 1109/AINAW. 2007. 54
  22. Vaithiyanathan, R. G. Sheeba, E. E. N. , and S. Radha, "A Novel Method for Detection and Elimination of Modi?cation Attack and TTL Attack in NTP Based Routing Algorithm," in Proceedings of the 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, ser. ITC '10. Washington, DC, USA: IEEE Computer Society, 2010, pp. 60–64. [Online]. Available:http://dx. doi. org/10. 1109/ITC. 2010. 23
  23. P. Yi, Z. Dai, Y. Zhong, and S. Zhang, "Resisting Flooding Attacks in Ad Hoc Networks. " in ITCC (5). IEEE Computer Society, 2005, pp. 657–662. [Online]. Available:http://dblp. unitrier. de/db/conf/itcc/itcc2005-2. html#YiDZZ05
  24. I. Aad, J. -P. Hubaux, and E. W. Knightly, "Denial of Service Resilience in Ad hoc Networks," in Proceedings of the 10th annual international conference on Mobile computing and networking, ser. MobiCom '04. New York, NY, USA: ACM, 2004,pp. 202–215. [Online]. Available: http://doi. acm. org/10. 1145/1023720. 1023741
  25. M. Zeshan, S. A. Khan, A. R. Cheema, and A. Ahmed, "Adding Security against Packet Dropping Attack in Mobile Ad Hoc Networks," in Future Information Technology and Management Engineering, 2008. FITME'08. International Seminar on. IEEE, 2008, pp. 568–572.
  26. J. Soryal and T. Saadawi, "IEEE 802. 11 Denial of Service Attack Detection in MANET," in Wireless Telecommunications Symposium (WTS), 2012. IEEE, 2012, pp. 1–8.
  27. N. Sharma, B. Raina, P. Rani, Y. Chaba, and Y. Singh, "Attack Prevention Methods For DDOS Attacks In MANETS," ASIAN JOURNAL OF COMPUTER SCIENCE & INFORMATION TECHNOLOGY, vol. 1, no. 1, 2013.
  28. G. O'Shea and M. Roe, "Child-Proof Authentication for MIPv6 (CAM)," Computer Communication Review,vol. 31, no. 2, pp. 4–8, 2001. [Online]. Available:http://dblp. uni-trier. de/db/journals/ccr/ccr31. html#OSheaR01
  29. G. Montenegro and C. Castelluccia, "Statistically Unique and Cryptographically Veri?able (SUCV) Identi?ers and Addresses," 2002.
  30. T. Aura, "Cryptographically Generated Addresses (CGA),"RFC 3972 (Proposed Standard), Internet Engineering Task Force, March 2005, updated by RFCs 4581, 4982. [Online]. Available: http://www. ietf. org/rfc/rfc3972. txt
  31. C. Vogt, W. Haddad, and J. Arkko, "Aplying Cryptographically Generated Addresses and Credit-Based Authorization to Mobile IPv6," Internet Draft, IETF, 2006.
  32. N. Hakiem, A. Priantoro, M. Siddiqi, and T. Hasan, "Generation of Cryptographic One-to-Many Mapping IPv6 Address using S-AES," in Information and Communication Technology for the Muslim World (ICT4M), 2010 International Conference on. IEEE, 2010, pp. E13–E18.
  33. N. Hakiem, M. U. Siddiqi, and S. P. W. Jarot, "Collision Probability of One-to-Many Reversible Mapping for IPv6 Address Generation," in Computer and Communication Engineering (ICCCE), 2012 International Conference on. IEEE, 2012,pp. 599–602.
  34. D. J. Bernstein, "Cache-Timing Attacks on AES," April 2005.
  35. W. D. Smith, "1. AES seems weak. 2. Linear time secure cryptography. " IACR Cryptology ePrint Archive, vol. 2007,p. 248, 2007. [Online]. Available:http://dblp. unitrier. de/db/journals/iacr/iacr2007. html#Smith07
  36. Sekar. A, Radhika. S, and Anand. K, "Secure Communication using 512 Bit Key," European journal of Scienti?c Research, vol. 52, no. 1, pp. 61–65, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

MANET AES Algorithm CGA blackhole attack IPV6.