Security Considerations in Wireless Ad-hoc Networks Using Commitment Schemas

Abstract

The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Although the attack models are classified as both external and internal with the latter being more serious because the “always-on” strategy employed in external model has several disadvantages. In an internal threat model an adversary is assumed to be aware of network secrets and the implementation details of network protocols at any layer in the network stack. The adversary exploits his internal knowledge for launching selective jamming attacks in which specific messages of “high importance” are targeted. Although RREQ, RREP, RERR, RREP-ACK are primary Message Formats in reactive protocols, the adversary selectively targets RREQ and RREP packets in the network to launch jamming attacks. Prior approaches concentrated on using commitment schemes that are cryptographic primitives to hide the RREQ and RREP packets from the purview of the adversary. These approaches being successful, I propose to use them along with intrusion detection techniques for identifying compromised routers to increase overall network security significantly by marginalizing the working boundaries of an adversary, thus risking exposure. A practical implementation validates our claim.

Authors and Affiliations

M. Kiranbabu

Keywords

Related Articles

Android App for Local Railway Ticketing Using GPS Validation

One of the biggest challenges in the current ticketing facility is "QUEUE" in buying our suburban railway tickets. In this fast growing world of technology we still stand in the queue or buy with oyster & octopus cards f...

Suitability of Groundwater Quality for Irrigation

Reconnaissance on the suitability of groundwater quality for irrigation in Tubinakere industrial area, Mandya district, Karnataka was done by determining ion exchange, potential salinity, Cl- /HCO3 - ratio, magnesium haz...

Impact of Using Face Book for Interpersonal Friendship

My study is about interpersonal friendship on face book. So many people research about face book relationships. The further research of the study has lot of things. Example face book addiction, face book is a entertainme...

Survey on Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs

3G technology has stimulated a wide variety of high band width applications on smart phones, such as video streaming and content-rich web browsing. Although having those applications mobile is quite appealing, high data...

Similar Characteristics of Fibrillar form of β-Amyloid Peptide Fractions from Mice Brain affected by Systemic Amyloidosis

Enhanced expression of amyloid β-peptide (Aβ) and deposition is the main causative factor in Alzheimer’s disease (AD). Factors that lead to the genesis of accumulation and toxicity of Aβs are yet to be identified. While...

Download PDF file
  • EP ID EP221073
  • DOI -
  • Views 74
  • Downloads 0

How To Cite

M. Kiranbabu (2014). Security Considerations in Wireless Ad-hoc Networks Using Commitment Schemas. International journal of Emerging Trends in Science and Technology, 1(8), 1347-1351. https://europub.co.uk/articles/-A-221073