Title :
A time space cryptography hashing solution for prevention Jellyfish reordering attack in wireless adhoc networks
Author :
Patel, Hetal P. ; Chaudhari, M.B.
Author_Institution :
Dept. of Comput. Sci. & Eng., Gov. Eng. Collage, Gandhinagar, India
Abstract :
In this paper, we propose a new scheme for preventing the jellyfish reordering attack. Jellyfish attack is a new denial of service attack that exploits the end to end congestion control mechanism of TCP (Transmission Control Protocol). The main goal of the Jellyfish nodes is to reduce the goodput of all the flows by either reordering the packets or dropping a small fraction of packets. The proposed scheme uses time-space cryptography and modified SHA-1 (mSHA-1) hash function for verifying whether packets are Reorder or not. This is implemented by modify AOMDV routing protocol using NS-2.35 network simulator. The simulation results show that the solution is effective in increasing the performance of the network.
Keywords :
ad hoc networks; cryptographic protocols; routing protocols; time-domain analysis; AOMDV routing protocol; NS-2.35 network simulator; TCP; denial of service attack; end to end congestion control mechanism; jellyfish reordering attack; mSHA-1 hash function; modified SHA-1 hash function; time-space cryptography; transmission control protocol; wireless ad hoc network; Ad hoc networks; Cryptography; Packet loss; Routing protocols; Wireless networks; AOMDV Protocol; Jellyfish Reorder attack; keyed hash function; wireless adhoc networks;
Conference_Titel :
Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
Conference_Location :
Tiruchengode
Print_ISBN :
978-1-4799-3925-1
DOI :
10.1109/ICCCNT.2013.6726689