Detection of Colluding Collision and Identity Delegation Attacks in Wireless Ad Hoc Networks via SADEC
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
The colluding collision and identity delegation attack comes under the new class of attacks of wireless ad hoc networks namely stealthy attacks that diminish the expense and sight of the invader. The nodes which are compromised by these attacks provide the impression to their neighbors as if they are doing the correct forwarding action. The normal nodes will be accused of showing malicious behavior. In the colluding collision attack, the adversary injects malicious nodes at the opportune time so that collision will occur and hence, the packet will not reach the destination. In case of identity delegation attack, the malicious nodes relay their identities to some other compromised node in the network so as to make the packet which it receives to be delivered to a wrong next hop by making use of that delegated identity. Observation of the behavior of the neighborhood which is performed by the normal network nodes is one of the common methods for detecting attacks in wireless networks. Local monitoring also does the same but these cannot detect stealthy attacks efficiently as they isolate legitimate nodes mistakenly. This drawback can be rectified using a protocol called SADEC. It makes use of the local monitoring technique by increasing the number of nodes that can do the monitoring function and they maintain additional information about the routing path so that it can check whether each node is doing its legitimate action.
Authors and Affiliations
Angel Mary Alex , M. Ashwin
A Comprehensive Study of Data Mining and Application
Data mining refers to extracting or ―mining‖ knowledge from large amounts of data. Data mining involves an integration of techniques from multiple disciplines such as database technology, statistics, machine learni...
Economic Load Dispatch with Valve Point Loading Effect and Generator Ramp Rate Limits Constraint using MRPSO
Healthcare Information Technology Service Assessment: A Healthcare Leader Prospective
Information technology has evolved over the years and comply its presence in all the industrial sectors and healthcare is not an exception. It has become more and more necessary for every health care professional...
SECURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN CLOUD COMPUTING
The growing trend towards grid computing and cloud computing provides enormous potential for allowing dynamic, distributed and data demanding applications such as sharing and processing of large-scale scientific data. Cl...
Implementation of Matched Filter Based DSSS Digital GPS Receiver
The Global Positioning System (GPS) is a satellite-based radio navigation system made up of a network of 24 satellites placed in an orbit by the US Department of Defense. GPS was originally intended for military applicat...