223 research outputs found
Secure Routing for Mobile Ad hoc Networks
The emergence of the Mobile Ad Hoc Networking (MANET) technology advocates
self-organized wireless interconnection of communication devices that would
either extend or operate in concert with the wired networking infrastructure
or, possibly, evolve to autonomous networks. In either case, the proliferation
of MANET-based applications depends on a multitude of factors, with
trustworthiness being one of the primary challenges to be met. Despite the
existence of well-known security mechanisms, additional vulnerabilities and
features pertinent to this new networking paradigm might render such
traditional solutions inapplicable. In particular, the absence of a central
authorization facility in an open and distributed communication environment is
a major challenge, especially due to the need for cooperative network
operation. In particular, in MANET, any node may compromise the routing
protocol functionality by disrupting the route discovery process. In this
paper, we present a route discovery protocol that mitigates the detrimental
effects of such malicious behavior, as to provide correct connectivity
information. Our protocol guarantees that fabricated, compromised, or replayed
route replies would either be rejected or never reach back the querying node.
Furthermore, the protocol responsiveness is safeguarded under different types
of attacks that exploit the routing protocol itself. The sole requirement of
the proposed scheme is the existence of a security association between the node
initiating the query and the sought destination. Specifically, no assumption is
made regarding the intermediate nodes, which may exhibit arbitrary and
malicious behavior. The scheme is robust in the presence of a number of
non-colluding nodes, and provides accurate routing information in a timely
manner.Comment: arXiv admin note: text overlap with arXiv:1208.3486, arXiv:1303.7300
by other author
Secure Routing for Mobile Ad hoc Networks
The emergence of the Mobile Ad Hoc Networking (MANET) technology advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. In either case, the proliferation of MANET-based applications depends on a multitude of factors, with trustworthiness being one of the primary challenges to be met. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render such traditional solutions inapplicable. In particular, the absence of a central authorization facility in an open and distributed communication environment is a major challenge, especially due to the need for cooperative network operation. In particular, in MANET, any node may compromise the routing protocol functionality by disrupting the route discovery process. In this paper, we present a route discovery protocol that mitigates the detrimental effects of such malicious behavior, as to provide correct connectivity information. Our protocol guarantees that fabricated, compromised, or replayed route replies would either be rejected or never reach back the querying node. Furthermore, the protocol responsiveness is safeguarded under different types of attacks that exploit the routing protocol itself. The sole requirement of the proposed scheme is the existence of a security association between the node initiating the query and the sought destination. Specifically, no assumption is made regarding the intermediate nodes, which may exhibit arbitrary and malicious behavior. The scheme is robust in the presence of a number of non-colluding nodes, and provides accurate routing information in a timely manner
Detection of Wormhole Attack using Hop-count and Time delay Analysis
Abstract- MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. In this paper we specifically considering Tunneling attack which does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting suspicious routes as in previous methods, we implement a new method which detects the attacker nodes and works without modification of protocol, using a hop-count and time delay analysis from the viewpoint of users without any special environment assumptions. The proposed work is simulated using OPNET and results showing the advantages of proposed work. Index Terms- Ad hoc network, hop-count analysis, network security, Tunneling attack
Recommended from our members
Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection
Most of the MANET security research has so far focused on providing routing security and confidentiality to the data packets, but less has been done to ensure privacy and anonymity of the communicating entities. In this paper, we propose a routing protocol which ensures anonymity, privacy of the user. This is achieved by randomly selecting next hop at each intermediate. This protocol also provides data security using public key ciphers. The protocol is simulated using in-house simulator written in C with OpenSSL crypto APIs. The robustness of our protocol is evaluated against known security attacks
A secure and lightweight ad-hoc routing algorithm for personal networks
Over the past few years, there has been increasing interest in utilizing Personal Area Networks (PANs) to offer users innovative and personalized services. This interest is a consequence of the widespread use of mobile devices such as laptops, mobile phones, PDAs, digital cameras, wireless headsets, etc. to carry out a variety of user-centric tasks. The PAN itself is built upon an ad-hoc network where devices trust their neighbors to route their packets. The cooperative nature of ad-hoc networks allows malicious nodes to easily cripple the network by inserting false route information, replaying old messages, modifying messages of other nodes, etc. An applicable area still under research, and the focus of this paper, is secure routing protocols for ad-hoc networks. To achieve availability in the PAN, the routing protocol used must be robust against both dynamically changing topology and malicious attacks. However, the heterogeneous nature of Personal Network (PN) devices means that traditional security mechanisms are too resource intensive to be sufficient by themselves. This paper describes a new ad-hoc secure routing protocol for Personal Networks (PNs), suitable in a limited multi-hop scenario. This protocol is based on ADOV and relies on efficient cryptographic primitives to safeguard the security and privacy of PN users. Following that, a number of attacks in the area of ad-hoc networks are discussed, and it is shown that the new algorithm protects against multiple un-coordinated active attackers, in spite of compromised nodes in the network
- …