A Review on Impersonation Attack in Mobile Ad-Hoc Network
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 1
Abstract
An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to Open medium, dynamic topology, Distributed Cooperation, Constrained Capabilities ad hoc networks are vulnerable to many types of security attacks. Impersonation attack is special case of integrity attacks where by a compromise node impersonates a legitimate node one due to the lack of authentication in current ad hoc routing protocol. In this paper, we are describing the causes of impersonation attack and their vulnerable effects which give chance to a malicious node for doing other attacks too. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. Our approach is to detecting and eliminating impersonation attack using secure routing protocols.
Authors and Affiliations
Nidhi Gour , Monika Agarwal , Heena Singh , Ajay Kumar
Facilitating Document Annotation Using Content & Querying Value
Collections of huge, large textual data contains significant amount of structured information, which remains hidden in unstructured text. Relevant information is always difficult to find in these documents. In this paper...
A Survey of Machine Learning Algorithm in Network Traffic Classification
Network Traffic Classification is an emerging research area and now a day the research is widely used in various activities such as intrusion detection system and for security purpose. Many of the protocols and proposed...
Design and Analysis of Power Efficient PTL Half Subtractor Using 120nm Technology
In the designing of any VLSI System, arithmetic circuits play a vital role, subtractor circuit is one among them. In this paper a Power efficient Half-Subtractor has been designed using the PTL technique. Subtractor cir...
Cluster Based Secure Data Broadcast of CLAODV Protocol for MANET
Ad-hoc Networks are using multicast protocol to broadcast the messages. Multicast authentication in ad-hoc networks are very challenging based on below mentioned multiple factors such as nodes have limited computing, ban...
Advanced Vehicle Tracking System on Google Earth Using GPS and GSM
Vehicle navigation is one of the most important applications in the era of navigation which is mostly used by drivers. Therefore the efficiency of the maps given to the drivers has a great importance in the navigation sy...