DocumentCode :
3107438
Title :
Securing TORA against Sybil attack in MANETs
Author :
Thawani, Suraj ; Upadhyay, Hardik
Author_Institution :
PG Sch., Dept. of Wireless & Mobile Comput., GTU, Ahmedabad, India
fYear :
2015
fDate :
25-27 Feb. 2015
Firstpage :
475
Lastpage :
478
Abstract :
Mobile Ad-hoc Network (MANET) is a quite challenging to ensures security because if it´s open nature, lack of infrastructure, and high mobility of nodes. MANETs is a fast changing network in a form of decentralized wireless system. It requires a unique, distinct and persistent identity per node in order to provide their security and also has become an indivisible part for communication for mobile device. In this phase of dissertation, we have focused giving security to Temporally Ordered Routing Protocol Algorithm (TORA) from Sybil attack. TORA is based on a family of link reversal algorithm. It is highly adaptive distributing routing algorithm used in MANET that is able to provide multiple loop-free routes to any destination using the Route Creation, Route Maintenance and Route Erasure functions. Sybil attack is a serious threat for wireless networks. This type of attacker comes in the network and they start creating multiple identities. From that multiple identities they are disrupting the network by participating in communication with line breaking nodes. This cause huge loss in network resources. These networks can be protected using network failure and firewall detection schemes for detecting the attack and minimizing their effects. Proposed approach is expected to secure TORA through the implementation. Performance factor of network would be taken into consideration in order to verify the efficiency of modified TORA in MANET environment.
Keywords :
mobile ad hoc networks; routing protocols; telecommunication security; MANETs; Sybil attack; TORA; adaptive distributing routing algorithm; firewall detection schemes; link reversal algorithm; mobile ad-hoc network; network failure schemes; route creation functions; route erasure functions; route maintenance functions; temporally ordered routing protocol algorithm; Ad hoc networks; Mobile communication; Mobile computing; Peer-to-peer computing; Routing; Routing protocols; Security; Mobile Ad-hoc Networks; Security; Sybil Attack; TORA;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE), 2015 International Conference on
Conference_Location :
Noida
Print_ISBN :
978-1-4799-8432-9
Type :
conf
DOI :
10.1109/ABLAZE.2015.7155042
Filename :
7155042
Link To Document :
بازگشت