Title :
A Novel Method for Detection and Elimination of Modification Attack and TTL Attack in NTP Based Routing Algorithm
Author :
Vaithiyanathan ; Gracelin, Sheeba R ; Edna, Elizabeth N. ; Radha, S
Author_Institution :
Dept. of ECE, SSN Coll. of Eng., Chennai, India
Abstract :
An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a mobile ad-hoc network (MANET). Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR, and NTP are used. As the network is wireless, security becomes the major issue in Mobile Ad hoc Networks. Some of the attacks such as modification, fabrication, impersonation and denial of service attacks are due to misbehavior of malicious nodes, which disrupts the transmission. To avoid such attacks some of cryptographic algorithms and key management schemes are used. There are some existing security protocols such as ARAN, SAODV and SEAD etc and will be compared with the proposed algorithm. In this paper, new key management scheme is implemented in NTP protocol, since Node Transition Probability (NTP) based algorithm provides maximum utilization of bandwidth during heavy traffic with less overhead. NTP determines stable routes using received power, but the packet delivery cannot be guaranteed since it is a non secured protocol. The proposal detects the modification, impersonation attacks and TTL attacks and, avoids the effects of malicious node and determines appropriate measures to discard such malicious nodes in dynamic condition.
Keywords :
cryptographic protocols; mobile communication; routing protocols; telecommunication network topology; telecommunication security; wireless sensor networks; NTP based routing algorithm; TTL attack; ad-hoc network; adaptive routing protocols; attack detection; attack modification; cryptographic algorithms; key management schemes; modification attack; multi-hop wireless network; network topology; security protocols; Ad hoc networks; Change detection algorithms; Communication system security; Cryptographic protocols; Fabrication; Mobile ad hoc networks; Network topology; Routing protocols; Spread spectrum communication; Wireless networks; NTP; cryptography; malicious; modification attack; security;
Conference_Titel :
Recent Trends in Information, Telecommunication and Computing (ITC), 2010 International Conference on
Conference_Location :
Kochi, Kerala
Print_ISBN :
978-1-4244-5956-8
DOI :
10.1109/ITC.2010.23