TITLE

An Approach to Reduce Authentication Delay after Abrupt Termination of Mobile Node

AUTHOR(S)
Regin bose, K.; Sankaranarayanan, V.
PUB. DATE
June 2014
SOURCE
Australian Journal of Basic & Applied Sciences;Jun2014, Vol. 8 Issue 9, p7
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In mobile communication the mobile node (MN) can be abruptly disconnected from the network even when the connection is in established state. Then the mobile node is again required to re-establish the connection to be in the network. This is same as establishing a new connection. To avoid the process of connection establishment again, we have introduced an agent called Mobile Information Centre (MIC) along with an MIC Re- Registration Algorithm (MICRRA) for the re - establishment of connection. This MIC is placed within the Mobile Switching Centre (MSC). The algorithm authenticates the mobile node directly from MIC bypassing the home network during the abrupt termination. This re-establishment process reduces the communication overhead by utilizing the previous call-establishment parameters. The data packets received after reestablishment by the old MIC are rerouted to MN through new MIC, and thus avoids the retransmission delays. Security aspects are addressed by dual authentication procedures for the verification of a mobile node. Also mobile identity privacy is preserved without violating the security aspects. The keys used by the algorithm for the re - establishment process are longer in size, which reduces the possibilities of security attacks. Our algorithm saves time by 11%, compared to the existing algorithms. This mechanism reduces network traffic and the packet drops.
ACCESSION #
97368394

 

Related Articles

  • Enhanced Triple Umpiring System for Security and Performance Improvement in Wireless MANETS. Kathirvel, Ayyaswamy; Srinivasan, Rengaramanujam // International Journal of Communication Networks & Information Se;Jun2010, Vol. 2 Issue 2, p77 

    A mobile ad hoc network is a self-created, self-organized and self-administering set of nodes connected via wireless links without the aid of any fixed infrastructure or administrator. Protecting the network layer from malicious attacks is an important and challenging issue in both wired and...

  • Port Knocking with Single Packet Authentication using Asymmetric Key Cryptography. Reeves, Michael // Journal of Information Assurance & Security;2014, Vol. 9 Issue 1, p1 

    Protecting services from attack is the sole purpose of a firewall; however, some services (generally those for remote administration) require enough leniencies in their rules that the protection of a firewall is quite limited. Port Knocking is a method which may helps protect against attack, by...

  • Efficient MAC Protocol for Subcarrier-Wise Rate Adaptation over WLAN. Sung Won Kim; Byung-Seo Kim; Sung Back Hong // EURASIP Journal on Wireless Communications & Networking;2010, Special section p1 

    While bit-loading algorithms over wireless systems have been extensively studied, the development of a protocol which implements bit-loading-based rate adaptation over wireless systems has not been highlighted. The design of such a protocol is not a trivial problem, due to the overhead...

  • A Performance Comparison and Evaluation of Analysing Node Misbehaviour in MANET using Intrusion Detection System. Pari, S. Neelavathy; Sridharan, D. // International Journal of Computer Science Engineering & Technolo;Feb2011, Vol. 1 Issue 1, p35 

    This Paper presents a coherent survey on to detect the misbehaving node in Mobile Ad hoc Network (MANET) with the intent of serving as a quick reference to the current research issues in MANET. A mobile ad-hoc network is an infrastructure less network, that is self-configuring mobile nodes...

  • CDMA BASED SECURE CROSS LAYER FRAMEWORK FOR AUTHENTICATION AND SCHEDULING IN MANET. DANIEL ROSARIO, B. BERIL; RAJARAM, A. // Journal of Theoretical & Applied Information Technology;11/30/2014, Vol. 69 Issue 3, p452 

    In MANET, mobile nodes are connected without any centralized administration. Due to that, a mobile node is easily affected by means of several attacks. Due to these attacks, network is totally partitioned and more packet congestion occurs. Because of improper scheduling, congestion level of...

  • Optimization on Control Overhead in MANET.  // International Journal of Computer Applications;Dec2010, Vol. 12, p16 

    The article discusses an optimized ad-hoc on-demand distance vector (AODV) and optimized distance source routing (DSV) computer algorithms to minimize the control overhead. It offers a background of mobile ad-hoc network (MANET) and its routing protocols which are classified as either proactive,...

  • Misbehaving Node Detection in Mobile Ad Hoc Networks using Multi Hop Acknowledgement Scheme. Sakthivel, Usha; Radha, S. // Journal of Computer Science;2011, Vol. 7 Issue 5, p723 

    Problem statement: For any node in a Mobile Ad hoc Network conservation of battery power and bandwidth are the priority. Hence, they try to reduce the overload they would otherwise incur when they forward packets. This selfish behavior of a node affects the throughput of the network. The nodes...

  • Enhancing Security in Mobile IPv6. Modares, Hero; Moravejosharieh, Amirhossein; Rosli Bin Salleh; Lloret, Jaime // ETRI Journal;Feb2014, Vol. 36 Issue 1, p51 

    In the Mobile IPv6 (MIPv6) protocol, a mobile node (MN) is a mobile device with a permanent home address (HoA) on its home link. The MN will acquire a care-of address (CoA) when it roams into a foreign link. It then sends a binding update (BU) message to the home agent (HA) and the correspondent...

  • A Dynamic Forecast Load-balancing Algorithm for High-speed Network Instruction Detection System. Yu Ying; Deng Qidong // International Proceedings of Computer Science & Information Tech;2012, Vol. 50, p128 

    The high-speed data flow network always makes a serious performance bottleneck on intrusion detection system, leading to the detector of parallel intrusion detection system load unevenly. Packets cannot be fast through the detection system, the processing time tends to make the network more...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics