A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Rajesh Babu, M.
- Detecting Misbehaving Forwarders in Wireless Sensor Networks Using Hierarchical Algorithm
Authors
1 PSG College of Technology, Coimbatore, TamilNadu 641004, IN
Source
Wireless Communication, Vol 4, No 9 (2012), Pagination: 488-493Abstract
Wireless Sensor Networks (WSNs) consists of large number of sensing nodes used for sensing, computational and transmission power. Generally in a typical deployment of sensor networks, the sensor nodes are randomly deployed in a two dimensional area. One of the major challenges that wireless sensor networks face today is security. As sensors have limited power and computational capability, any security mechanism for sensor network must be energy efficient and should not be computational intensive. Packet dropping and modification are common attacks that can be initiated to interrupt communication in wireless multi-hop sensor networks. Many methods have been proposed to endure such attacks but only few can successfully identify the intruders. To overcome this problem, a simple effective method has been proposed using hierarchical algorithm, which identifies misbehaving forwarders that drop or modify packets then eliminate them and choose the alternative path for data transmission. Extensive analysis and simulations have been conducted to verify the effectiveness and efficiency of this method.
Keywords
AODV Protocol, Packet Dropping, Packet Modification and Wireless Sensor Networks.- Anomaly Detection for Denial of Service Attacks and Malicious Flooding in MANETs
Authors
1 PSG College of Technology, Coimbatore, Tamilnadu 641004, IN
Source
Wireless Communication, Vol 4, No 9 (2012), Pagination: 494-499Abstract
MANETs (Mobile Ad hoc Networks) is the self configuring network formed by mobile nodes which are connected by wireless links. Due to the mobility and independent topology, there occur many routing attacks which corrupt the topology of the network. Among several attacks, the Denial of Service (DoS) attacks and Resource Consumption attacks are the harmful attacks in the MANETs since these attacks interrupt the network resource unavailable to its user and resource consumption attack wastes the resources of a specific node. Example for DoS attacks are Black hole and worm hole attack. In Black hole attack, the malicious node sends a forged Route Reply (RREP) packet to a source node that initiates the route discovery in order to pretend to be a destination node and the Wormhole attack is otherwise known as Tunneling attack. The attacker forwards packets through a high quality out of bond link and reply these packets at another location in the network. In this paper, a new method is proposed to detect the anomalies by using the threshold values. Based on these values, the normal nodes could be detected and differentiated from the anomaly nodes. The packets are then made to send through the normal nodes excluding the anomaly nodes. The simulation results show the effectiveness of the proposed method which detects the DoS attacks and malicious flooding attack.
Keywords
Anomaly Detection Scheme, AODV, DoS Attack, Malicious Flooding, MANETs.- Efficient and Secure Routing Protocol for Mobile ADHOC Networks
Authors
1 Department of CSE, PSG College of Technology, Coimbatore, IN
2 Francis Xavier Engineering College, Tirunelveli, IN
Source
Wireless Communication, Vol 2, No 5 (2010), Pagination: 126-131Abstract
A mobile ad hoc Network (MANET) is a mobile mesh network in which the wireless nodes are both hosts and routers, so they can communicate without base stations. It relies on the cooperation of all the participating nodes. The cooperation requires detecting routes and forwarding packets. The proper functioning of mobile ad hoc networks depends on the hypothesis that each individual node is ready to forward packets to all other nodes. Due to the movement of nodes from various places, the nodes can become malicious by the intruders or by any other failures. Even though many secured routing protocols can be proposed for security issues, they can only detect the failures in the route discovery. Our mechanism provides the secured route discovery against the malicious nodes even the data transfer begins in the route path. If the malicious node has been found, it drops the packets from the node and informs the source and destination node to change the path of the data transfer from the node listing.Keywords
AODV, ESRP, Intruders. Routing Protocol.- A Secure Authenticated Routing Protocol for Mobile Adhoc Networks
Authors
1 PSG College of Technology, Coimbatore, Tamil Nadu 641004, IN
2 St.Peters College of Engineering, Chennai, Tamil Nadu 600054, IN
Source
Wireless Communication, Vol 1, No 3 (2009), Pagination: 130-135Abstract
In mobile adhoc networks, an attacker can easily disrupt the functioning of the network by attacking the underlying routing protocol. Several secured routing protocols have been proposed so far, for adhoc networks. But all of them have certain disadvantages. Hence, security in ad hoc networks is still a debatable area. In this paper, we propose to develop a Secure Authenticated Routing Protocol (SARP) for mobile adhoc networks, that uses a lightweight, attack resistant authentication mechanism. Our protocol provides an efficient security against route discovery attacks in MANET routing protocols. It quickly detects the malicious nodes, thus assisting the nodes to drop the invalid packets, earlier. It prevents malicious or compromised nodes from attacking the routes with uncompromised nodes. It also prevents a variety of denial-ofservice (DoS) attacks. Detailed simulation studies have confirmed the efficiency and effectiveness of SARP.
Keywords
AODV, Mobile Ad Hoc Networks, Routing Protocols, SAODV, SARP, Security.- Certain Investigations on Various Algorithms that is Used to Classify Malware and Goodware in Android Applications
Authors
1 Department of Computer Science, Bharathiar University, IN
2 Department of Computer Science and Engineering, Karpagam College of Engineering, IN