Proposing Trust Count Based Validation Method to Lessen Internal Attacks in Mobile Adhoc Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Security is an essential service for wired and wireless network communications. The success of mobile ad hoc networks (MANET) strongly depends on people’s confidence in its security. However, the characteristics of MANET pose both challenges and opportunities in achieving security goals, such as confidentiality, authentication, integrity, availability, access control, and non-repudiation. The wireless nature and inherent features of mobile ad hoc networks make them exposed to a wide variety of attacks. In an internal attack, the attacker gains the normal access to the network and takes part in the network activities, either by some malicious imitation to get the access to the network as a new node, or by directly compromising a current node and using it as a basis to conduct its malicious behaviors. In this paper, we develop a cluster based validation methods to lessen internal attacks. The entire network is divided into hierarchical group of clusters, each cluster having a fully trusted cluster head. Each node holds a certificate issued by an offline certificate authority (CA). The Trust Count (TC) for each of the nodes can be estimated periodically for every trust evaluation interval (TEI), based on their access policy (AP). The certificate of a node is renewed or rejected by the cluster head, based on its trust counter value. By simulation results, we show that our proposed technique provides better packet delivery ratio and resilience against node capture.
Authors and Affiliations
D. SRINIVASA RAO , MOHD. SHAJID ANSARI
XML Query Answering using Tree based Association Rules
Mainly two approaches are used to access XML document: keyword-based search and query-answering. The first one comes from the tradition of information retrieval. Where most searches are performed on the textual con...
Comparison of Modern Denoising Algorithms
Integrity of edge and detail information associated with the original images play an important role in applications. Images acquired from sensors, transmission errors and lossy compression contains noise and it is...
Bio-Medical Image Retrieval Using SVM
This paper presents an image retrieval system in a computer system for browsing, searching and retrieving images from a large database of digital images. The support vector machine (SVM) is a concept based on learn...
FPGA IMPLEMENTATION OF FOUR PHASE CODE DESIGN USING MODIFIED GENETIC ALGORITHM (MGA)
The proposed architecture consists of an efficient VLSI hardware implementation of the Modified Genetic Algorithm for identifying the good pulse compression sequences based on Discrimination Factor. The main advantag...
Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio
Spectrum scarcity is one of the most critical recent problems in the field of wireless communication. One of the promising approaches to resolve this issue is the use of Cognitive Radio technique. CR technique is p...