Detection of Colluding Collision and Identity Delegation Attacks in Wireless Ad Hoc Networks via SADEC
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 2
Abstract
The colluding collision and identity delegation attack comes under the new class of attacks of wireless ad hoc networks namely stealthy attacks that diminish the expense and sight of the invader. The nodes which are compromised by these attacks provide the impression to their neighbors as if they are doing the correct forwarding action. The normal nodes will be accused of showing malicious behavior. In the colluding collision attack, the adversary injects malicious nodes at the opportune time so that collision will occur and hence, the packet will not reach the destination. In case of identity delegation attack, the malicious nodes relay their identities to some other compromised node in the network so as to make the packet which it receives to be delivered to a wrong next hop by making use of that delegated identity. Observation of the behavior of the neighborhood which is performed by the normal network nodes is one of the common methods for detecting attacks in wireless networks. Local monitoring also does the same but these cannot detect stealthy attacks efficiently as they isolate legitimate nodes mistakenly. This drawback can be rectified using a protocol called SADEC. It makes use of the local monitoring technique by increasing the number of nodes that can do the monitoring function and they maintain additional information about the routing path so that it can check whether each node is doing its legitimate action.
Authors and Affiliations
Angel Mary Alex , M. Ashwin
Signaling Technique for Free Space Optics on the basis of Bit Error Rate
A new efficient method to implement orthogonal frequency division multiplexing (OFDM) on intensity modulated direct detection (IM/DD) channels is presented and termed auto-correlated optical OFDM. It is shown that...
Behavior of mixture of Sulfamic Acid and Sodium Chloride
A mono crystal known as single crystal of sulfamic acid (H2NSO3H) and sodium chloride (NaCl) is an inorganic non-linear optical material was grown by slow evaporation solution growth technique. In this work, we a...
Energy Efficient and Reliable Communication in Underwater Acoustic Sensor Networks
Normally, the communication in the earth surface is through electromagnetic or radio waves. But this is not possible in the underwater environments in an efficient way. In underwater environments radio does not wor...
INTERLEAVED FORWARD ERROR CORRECTING (FEC) CODES BASED ON BINAR SHUFFLE ALGORITHM (B.S.A)
Forward Error Correcting (FEC) is one of the technique is used for controlling errors without sending any retransmission to sender. Example of forward error correcting codes are hamming, lower-density parity-ch...
A Web Search Engine based approach to Measure the Semantic Similarity between Words using Page Count and Snippets Method (PCSM)
Semantic similarity measures play an important role in Information Retrieval, Natural Language Processing and Web Mining applications such as community mining, relation detection, entity disambiguation and document clust...