DocumentCode :
3515609
Title :
A Novel method for multiple attacks in NTP based routing algorithm
Author :
Vaithiyanathan ; Gracelin Sheeba, R. ; Edna Elizabeth, N. ; Radha, S
Author_Institution :
Dept of ECE, SSN Coll. of Eng., Chennai, India
fYear :
2010
fDate :
2-4 Jan. 2010
Firstpage :
1
Lastpage :
6
Abstract :
Mobile ad hoc networks are networks of mobile hosts with wireless interfaces that can dynamically form a network without the aid of any pre-existing infrastructure or centralized administration. Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR, and NTP are used. Security is the one of the major issue in mobile ad hoc network some of the attacks such as modification, fabrication, impersonation and denial of service attacks are due to misbehavior of malicious nodes, which disrupts the transmission. To avoid such attacks some of cryptographic algorithms and key management schemes are used. Some of the existing security protocols are ARAN, SAODV and SEAD etc. In this paper, novel key management scheme is implemented in NTP protocol, since node transition probability (NTP) based algorithm provides maximum utilization of bandwidth during heavy traffic with less overhead. NTP determines stable routes using received power, but the packet delivery cannot be guaranteed since it is a non secured protocol. The proposal detects the modification, impersonation, TTL and timing attacks and, avoids the effects of malicious node and determines appropriate measures to discard such malicious nodes in dynamic condition.
Keywords :
ad hoc networks; cryptography; mobile radio; routing protocols; telecommunication network management; telecommunication security; AODV; NTP based routing algorithm; cryptographic algorithms; denial of service attacks; efficient adaptive routing protocols; key management schemes; mobile ad hoc networks; mobile hosts; network topology; node transition probability routing protocol; wireless interfaces; Bandwidth; Communication system security; Computer crime; Cryptographic protocols; Cryptography; Fabrication; Mobile ad hoc networks; Network topology; Proposals; Routing protocols; NTP; cryptography; malicious; modification attack; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communication and Sensor Computing, 2010. ICWCSC 2010. International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4244-5136-4
Electronic_ISBN :
978-1-4244-5137-1
Type :
conf
DOI :
10.1109/ICWCSC.2010.5415901
Filename :
5415901
Link To Document :
بازگشت