Proposing Trust Count Based Validation Method to Lessen Internal Attacks in Mobile Adhoc Networks  

Abstract

Security is an essential service for wired and wireless network communications. The success of mobile ad hoc networks (MANET) strongly depends on people’s confidence in its security. However, the characteristics of MANET pose both challenges and opportunities in achieving security goals, such as confidentiality, authentication, integrity, availability, access control, and non-repudiation. The wireless nature and inherent features of mobile ad hoc networks make them exposed to a wide variety of attacks. In an internal attack, the attacker gains the normal access to the network and takes part in the network activities, either by some malicious imitation to get the access to the network as a new node, or by directly compromising a current node and using it as a basis to conduct its malicious behaviors. In this paper, we develop a cluster based validation methods to lessen internal attacks. The entire network is divided into hierarchical group of clusters, each cluster having a fully trusted cluster head. Each node holds a certificate issued by an offline certificate authority (CA). The Trust Count (TC) for each of the nodes can be estimated periodically for every trust evaluation interval (TEI), based on their access policy (AP). The certificate of a node is renewed or rejected by the cluster head, based on its trust counter value. By simulation results, we show that our proposed technique provides better packet delivery ratio and resilience against node capture.  

Authors and Affiliations

D. SRINIVASA RAO , MOHD. SHAJID ANSARI

Keywords

Related Articles

ANALYSIS OF WAVELET TRANSFORM AND FAST WAVELET TRANSFORM FOR IMAGE COMPRESSION: REVIEW 

A Detailed study of discrete wavelet transform and fast wavelet transform has been presented in this paper. Older techniques for image compression such as FFT and DCT have also been discussed. Wavelet analysis represents...

Micro-cantilever Sensors for Detection of Pesticide Contents in the Water-table of Malwa Region in Punjab  

Biosensors based on microcantilevers have become a promising tool for directly detecting biomolecular interactions with great accuracy. Microcantilevers translate molecular recognition of biomolecules into nanomechani...

Data Hiding in Color Images Using Modified Quantization Table 

With the rapid growth of of internet and wireless networks, information security becomes significant to protect e-commerce and personal privacy. Data Hiding is an important issue for information security.There has...

WPA Exploitation In The World Of Wireless Network  

Wifi device uses security authentication protocol even though they are having some weakness. Generally wep, wpa protocols are used for security purpose. This is already proved that WEP authentication protocol is a we...

Identification of diabetic retinopathy stages in human retinal image 

A novel method to identify the Diabetic retinopathy stages in human retinal image is proposed. Diabetic retinopathy is the dangerous eye disease cause the blindness in worldwide. The first manifestation of diabetic...

Download PDF file
  • EP ID EP115281
  • DOI -
  • Views 106
  • Downloads 0

How To Cite

D. SRINIVASA RAO, MOHD. SHAJID ANSARI (2012). Proposing Trust Count Based Validation Method to Lessen Internal Attacks in Mobile Adhoc Networks  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(4), 433-438. https://europub.co.uk/articles/-A-115281