A Review on Impersonation Attack in Mobile Ad-Hoc Network
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 1
Abstract
An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to Open medium, dynamic topology, Distributed Cooperation, Constrained Capabilities ad hoc networks are vulnerable to many types of security attacks. Impersonation attack is special case of integrity attacks where by a compromise node impersonates a legitimate node one due to the lack of authentication in current ad hoc routing protocol. In this paper, we are describing the causes of impersonation attack and their vulnerable effects which give chance to a malicious node for doing other attacks too. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. Our approach is to detecting and eliminating impersonation attack using secure routing protocols.
Authors and Affiliations
Nidhi Gour , Monika Agarwal , Heena Singh , Ajay Kumar
Object Deployment Using Data Trans-Reception in Military Applications
An mobile ad-hoc network (MANETs) is a set of limited range wireless nodes that function in a cooperative manner so as to increase the overall range of the network. In general, routing protocols for MANETs are designed b...
Harmony Search Optimization in K-Means Clustering
Clustering is a data mining technique that classifies a set of observations into clusters based on some similarity measures. The most commonly used partitioning based clustering algorithm is K-means. However, the K-means...
Performance Analysis of SEP and LEACH for Heterogeneous Wireless Sensor Networks
While wireless sensor networks are increasingly equipped to handle more complicated functions, these battery powered sensors which used in network processing, use their constrained energy to enhance the lifetime of the n...
Embedding a Non-Standard Encryption/Decryption Method with Mathematical Draw Function to Meet Challenges in Mobility
Our innovation and personal information are passes through air in wireless network and their secrecy can be preserved by using any one of the encryption method. Nowadays mobile plays a vital role in passing messages and...
Comparative Study of Sleep Mode Interleaving and Energy Efficiency Substream Allocation Algorithm
This paper deals with algorithms which provides solutions to energy saving. Energy saving is affected by the frequency allocation of bandwidth mechanisms. This problem is solved by two methods. First one is novel sleep-m...