85 research outputs found

    A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

    Full text link
    This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ad hoc network security. Then, we propose a solution to secure GPSR packet by adding a digital signature based on symmetric cryptography generated using the AES algorithm and the MD5 hash function more suited to a mobile environment

    A General Survey on Rushing Attack in MANETs

    Get PDF
    MANETs (Mobile Ad hoc Network) is a kind of network in which all the nodes are connected via wireless link. There is no fixed infrastructure because of which any node can join or leave the network at any point time. There is no central monitoring system. All the nodes are working as host as well as client at the same time. This makes the network vulnerable to different kind of attacks. Standard routing protocols are also not that secured to protect the network from all probable attacks. Attacker may attack the network and disrupt the network services abruptly. Some of the common attacks in MANETs are Rushing attack, Black hole attack, Sybil attack, Neighbor attack and Jellyfish attack etc. In this paper we are trying to accumulate different probabilities of getting rushing attack in MANETs. And also discuss about different counter measures to prevent as well as to detect rushing attack.Keywords:Rushing attack, MANETs, Security, Denial of Service (DoS), Security threat

    An Approach to Develop Security Aspect of MANET using NS2 Field

    Get PDF
    A Mobile network is a open area network in which any user can enter to the system and increases the network traffic. Large amount of useless traffic over the network results the congestion on the network nodes. As the data is transferred over these nodes, it increases the network delay and the data loss over the network. To identify the safe path over the network, we have defined an association mining based adaptive approach under different parameters. A Mobile network always undergoes from different kind of external and internal attacks. One of such internal attack is DOS attack (Denial-of-Service). A DOS attack generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the network. In this type of attack a particular user flooded the bandwidth with useless traffic and disturbs flow of data to other users. So a reliable communication path over the network is required with minimum delay & loss. Data mining approach is used to present the solution for this problem with effective throughput and minimum loss over the network. DOI: 10.17762/ijritcc2321-8169.15064

    Paris Attack in Wireless Ad Hoc Network

    Get PDF
    Mobile Ad hoc networks are often used in places with little or no infrastructure. However its very nature of being dynamic and infrastructure less makes it vulnerable to many of the security related issues. In this paper we make use of the vulnerability present in the AODV protocol to present a new kind of Man in the Middle attack for MANETs namely, “The Paris Attackâ€

    A Hypothesis for Ad-Hoc Routing Algorithm Improvement

    Get PDF
    In this article, a new approach to reducing the complexity of routing algorithms is discussed to improve routing in ad hoc networks. To avoid duplicating the routing process for each data transfer, nodes create binary matrices for each base station and update them when the routing is complete. Routing may be made much simpler using the method given here
    • …
    corecore