TITLE

Efficient Content Authentication in Ad-Hoc Networks-Mitigating DDoS Attacks

AUTHOR(S)
Joshi, Anuj; Agrawal, Krishna Kant; Arora, Deepak; Shukla, Shashwat
PUB. DATE
June 2011
SOURCE
International Journal of Computer Applications;Jun2011, Vol. 23, p35
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
With the emergence of mobile ad hoc networks it is now possible to access network accessing and communicate data in an area where no fixed infrastructure exists or existing infrastructure is not available. Since in ad hoc networks, the exact copies of the same content are stored at various locations. Therefore in order to prevent from various attacks based on the content; it becomes important to have some security solutions. In this paper, we propose an efficient content authentication method in ad hoc network. Foremost, the challenges in ad hoc networks have been mentioned in this paper. This paper focuses on secure packet forwarding in ad hoc networks and proposes a new solution based on observation by all the neighboring nodes to mitigate the effects of adverse situations caused by malicious nodes. This prevention mechanism exploits all well-behaving nodes' local knowledge to by pass misbehavin g nodes, evaluate path quality and choose the most reliable path for data forwarding. In this paper, a new solution for mobile ad hoc networks based on observation by all the neighboring nodes is presented.
ACCESSION #
74240848

 

Related Articles

  • An enhanced Scheme for Reducing Vertical handover latency. Faisal, Mohammad; Khan, Muhammad Nawaz // International Journal of Advanced Computer Science & Application;Jan2012, Vol. 3 Issue 1, p100 

    Abstract- Authentication in vertical Hand over is a demanding research problem. Countless methods are commenced but all of them have insufficiencies in term of latency and packet loss. Standard handover schemes (MIPv4, MIPv6, FMIPv6, and HMIPv6) also practice these shortages when a quick...

  • Comparative Analysis of AntHocNet, AODV, DSR Routing Protocols for Improvising Loss Packet Delivery Factor. Khemchandani, Maahi Amit; Balkhande, B. W. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 5, p6478 

    Adhoc wireless multi hope networks are increasing in popularity, because of use of low cost wireless networking solution has enabled wide variety of application and services available in laptops, cellular phones, sensor devices, PDAs and embedded system etc., provides ubiquitous access to...

  • A Novel Robust Routing Scheme Against Rushing Attacks in Wireless Ad Hoc Networks. Kim, Hyojin; Oliveira, Ruy; Bhargava, Bharat; Song, JooSeok // Wireless Personal Communications;Jun2013, Vol. 70 Issue 4, p1339 

    Standard on-demand routing protocols in wireless ad hoc networks were not originally designed to deal with security threats. Because of that, malicious users have been finding ways to attack networks. Rushing attacks represent one of such possibilities. In these attacks, malicious nodes forward...

  • Performance Evaluation of Pre-authenticated Handover across Gateways in Vehicular Networks. MARTINEZ, JUAN A.; RUIZ, PEDRO M. // Adhoc & Sensor Wireless Networks;2012, Vol. 15 Issue 1, p47 

    The emerging research area of vehicular networks has attracted the interest of car manufacturers as well as public authorities and service providers. Connecting a vehicle to the Internet through several elements deployed along the roads like road side units (RSUs) or access points is one of the...

  • CDMA BASED SECURE CROSS LAYER FRAMEWORK FOR AUTHENTICATION AND SCHEDULING IN MANET. DANIEL ROSARIO, B. BERIL; RAJARAM, A. // Journal of Theoretical & Applied Information Technology;11/30/2014, Vol. 69 Issue 3, p452 

    In MANET, mobile nodes are connected without any centralized administration. Due to that, a mobile node is easily affected by means of several attacks. Due to these attacks, network is totally partitioned and more packet congestion occurs. Because of improper scheduling, congestion level of...

  • CONGESTION BASED ROUTE RECOVERY TECHNIQUE FOR MANET. DEVI M.; UTHARIARAJ, V. RHYMEND // Journal of Theoretical & Applied Information Technology;8/10/2013, Vol. 54 Issue 1, p73 

    In mobile adhoc network (MANET), the previous work of the authors considered route recovery technique based on route failures alone and doesn't consider the packet drops due to congestion. The congestion is likely to occur when incoming traffic exceeds the network capacity which results in...

  • Secure Packet Encryption and Key Exchange System in Mobile Ad hoc Network. Sengan, Sudhakar; Pandian, S. Chenthur // Journal of Computer Science;2012, Vol. 8 Issue 6, p908 

    Problem statement: Mobile Ad-hoc Network is infrastructureless network supported by no fixed trusted infrastructure. The packets had a chance to drop or hacked by eavesdropper during transmission. So, encryption method is required for sending and receiving packet in secret manner. Approach: In...

  • Computer Simulations of VANETs Using Realistic City Topologies. Martinez, Francisco; Fogue, Manuel; Toh, C.; Cano, Juan-Carlos; Calafate, Carlos; Manzoni, Pietro // Wireless Personal Communications;Mar2013, Vol. 69 Issue 2, p639 

    Researchers in vehicular ad hoc networks (VANETs) commonly use simulation to test new algorithms and techniques. This is the case because of the high cost and labor involved in deploying and testing vehicles in real outdoor scenarios. However, when determining the factors that should be taken...

  • Performance Evaluation of AODV and ADV Protocols in VANET Scenarios. Dalal, Kusum; Chaudhary, Prachi; Dahiya, Pawan // International Journal of Computer Technology & Applications;2012, Vol. 3 Issue 1, p50 

    This paper presents a comparative test of two protocols namely-AODV and ADV in various mobility scenarios of Vehicular Ad-hoc NETworks (VANETs). In order to make comparison three performance criterions are selected which include number of packet drop, throughput and total time taken by...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics