34,231 research outputs found
Data Confidentiality in Mobile Ad hoc Networks
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less
networks comprised of mobile nodes that communicate over wireless links without
any central control on a peer-to-peer basis. These individual nodes act as
routers to forward both their own data and also their neighbours' data by
sending and receiving packets to and from other nodes in the network. The
relatively easy configuration and the quick deployment make ad hoc networks
suitable the emergency situations (such as human or natural disasters) and for
military units in enemy territory. Securing data dissemination between these
nodes in such networks, however, is a very challenging task. Exposing such
information to anyone else other than the intended nodes could cause a privacy
and confidentiality breach, particularly in military scenarios. In this paper
we present a novel framework to enhance the privacy and data confidentiality in
mobile ad hoc networks by attaching the originator policies to the messages as
they are sent between nodes. We evaluate our framework using the Network
Simulator (NS-2) to check whether the privacy and confidentiality of the
originator are met. For this we implemented the Policy Enforcement Points
(PEPs), as NS-2 agents that manage and enforce the policies attached to packets
at every node in the MANET.Comment: 12 page
Securing routing protocols in mobile ad hoc networks
A Mobile Ad Hoc Network (MANET) is more prone to security threats than other
wired and wireless networks because of the distributed nature of the network.
Conventional MANET routing protocols assume that all nodes cooperate without
maliciously disrupting the operation of the protocol and do not provide defence
against attackers. Blackhole and flooding attacks have a dramatic negative impact
while grayhole and selfish attacks have a little negative impact on the performance
of MANET routing protocols.
Malicious nodes or misbehaviour actions detection in the network is an important
task to maintain the proper routing protocol operation. Current solutions
cannot guarantee the true classification of nodes because the cooperative nature
of the MANETs which leads to false exclusions of innocent nodes and/or good
classification of malicious nodes. The thesis introduces a new concept of Self-
Protocol Trustiness (SPT) to discover malicious nodes with a very high trustiness
ratio of a node classification. Designing and implementing new mechanisms that
can resist flooding and blackhole attacks which have high negative impacts on
the performance of these reactive protocols is the main objective of the thesis.
The design of these mechanisms is based on SPT concept to ensure the high
trustiness ratio of node classification. In addition, they neither incorporate the
use of cryptographic algorithms nor depend on routing packet formats which make
these solutions robust and reliable, and simplify their implementations in different
MANET reactive protocols.
Anti-Flooding (AF) mechanism is designed to resist flooding attacks which relies
on locally applied timers and thresholds to classify nodes as malicious. Although
AF mechanism succeeded in discovering malicious nodes within a small time, it
has a number of thresholds that enable attacker to subvert the algorithm and
cannot guarantee that the excluded nodes are genuine malicious nodes which was
the motivation to develop this algorithm. On the other hand, Flooding Attack
Resisting Mechanism (FARM) is designed to close the security gaps and overcome
the drawbacks of AF mechanism. It succeeded in detecting and excluding more
than 80% of flooding nodes within the simulation time with a very high trustiness
ratio.
Anti-Blackhole (AB) mechanism is designed to resist blackhole attacks and relies
on a single threshold. The algorithm guarantees 100% exclusion of blackhole nodes
and does not exclude any innocent node that may forward a reply packet. Although
AB mechanism succeeded in discovering malicious nodes within a small time, the
only suggested threshold enables an attacker to subvert the algorithm which was
the motivation to develop it. On the other hand, Blackhole Resisting Mechanism
(BRM) has the main advantages of AB mechanism while it is designed to close
the security gaps and overcome the drawbacks of AB mechanism. It succeeded in
detecting and excluding the vast majority of blackhole nodes within the simulation
time
Optimized image processing and clustering to mitigate security threats in mobile ad hoc network
Since there are provisions of many attributes that are not possible or difficult to follow by networks conventionally, mobile ad-hoc networks are extensively deployed. This application starts through the defense sectors, the sensory node presents in the hostile territories down to the gadgets for congestion communication in traffic by general transportation when travelling for adequate provision of infrastructure during disaster recovery. As a lot of importance related to (mobile ad hoc network) MANET application, one important factor in ad-hoc networks is security. Using image processing for securing MANET is the area of focus of this research. Therefore, in this article, the security threats are assessed and representative proposals are summarized in ad-hoc network’s context. The study reviewed the current situation of the art for original to security provision called mobile ad hoc network for wireless networking. The threats to security are recognized while the present solution is observed. The study additionally summarized education erudite, talks on general issues and future instructions are recognized. Also, in this study, the forecast weighted clustering algorithm (FWCA) is employed as a cluster head over weighted clustering algorithm (WCA) is examined as quality in cluster-based routing, service is highly significant with MANET
Routing Protocols to Enhance Security in MANETS
Mobile ad hoc networking (MANET) is gradually emerging to be very important in the growth of wireless technology. This is anticipated to offer a range of flexible services to mobile and nomadic users by means of integrated homogeneous architecture. The proper routing protocol is necessary for better communication in MANET. One of the existing reliable protocols is Ad Hoc On-Demand Vector Routing (AODV) protocol which is a reactive routing protocol for ad hoc and mobile networks that maintains routes only between nodes that wants to communicate. There are various security issues to be considered in this protocol. In order to provide security for AODV protocol, Secure Ad Hoc On-Demand Vector Routing (SAODV) can be used. SAODV is an extension of the AODV routing protocol that can be used to shield the route discovery process by providing security characteristics like integrity and authentication. For secure protocol, digital signature, hash chains, etc., can be used in routing. This paper surveys on various techniques available for securing the mobile ad hoc network
A Survey on Security Analysis of Routing Protocols
Mobile ad hoc networking (MANET) is gradually emerging to be very important in the growth of wireless technology. This is anticipated to offer a range of flexible services to mobile and nomadic users by means of integrated homogeneous architecture. The proper routing protocol is necessary for better communication in MANET. One of the existing reliable protocols is Ad Hoc On-Demand Vector Routing (AODV) protocol which is a reactive routing protocol for ad hoc and mobile networks that maintains routes only between nodes that wants to communicate. There are various security issues to be considered in this protocol. In order to provide security for AODV protocol, Secure Ad Hoc On-Demand Vector Routing (SAODV) can be used. SAODV is an extension of the AODV routing protocol that can be used to shield the route discovery process by providing security characteristics like integrity and authentication. For secure protocol, digital signature, hash chains, etc., can be used in routing. This paper surveys on various techniques available for securing the mobile ad hoc network
Utilizing the protected learning calculation method to forestall the Black Hole Attacks in Mobile ad-hoc networks
Mobile Ad-hoc Networks (MANETs) are a gathering of portable hosts which speak with each other with no focal system power or altered foundation. Because of its attributes like portability furthermore, heterogeneity ad-hoc networks are more defenseless to assaults. Black hole is an assault where every one of the bundles sent to assailant hub, by neighboring hubs, are dropped purposefully. In this thesis, we propose a secure learning calculation method which intends to identify and securing the black hole by considering the bundle drop reasons in needless mode. Presented AODV direction convention is adjusted to distinguish and securing the black hole assault. The investigation results demonstrate that our proposed calculation secure the AODV against black hole assault in MANETs
ASMA: towards adaptive secured multipath in MANETs
As they are used to create open communities, Mobile Ad hoc NETworks (MANETs) are not favourable environments to establish trust, which is necessary to provide security. Multipath routing mechanisms within infrastructureless networks environment seems appropriate and useful to enhance security protection. In fact, the level of trust can be increased so as many of potential security attacks are detected, revealed and stopped.
Nevertheless an excessive control overhead is always generated. In this paper, we propose a global framework that integrates a set of concepts and mechanisms aiming at enhancing security in highly dynamic decentralized ad hoc networks. Our solution focuses on authentication, routing securing, trust management with reliable estimation of trust. A large panoply of attacks are prevented using our various mechanisms.8th IFIP/IEEE International conference on Mobile and Wireless CommunicationRed de Universidades con Carreras en Informática (RedUNCI
- …