Security Considerations in Wireless Ad-hoc Networks Using Commitment Schemas

Abstract

The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Although the attack models are classified as both external and internal with the latter being more serious because the “always-on” strategy employed in external model has several disadvantages. In an internal threat model an adversary is assumed to be aware of network secrets and the implementation details of network protocols at any layer in the network stack. The adversary exploits his internal knowledge for launching selective jamming attacks in which specific messages of “high importance” are targeted. Although RREQ, RREP, RERR, RREP-ACK are primary Message Formats in reactive protocols, the adversary selectively targets RREQ and RREP packets in the network to launch jamming attacks. Prior approaches concentrated on using commitment schemes that are cryptographic primitives to hide the RREQ and RREP packets from the purview of the adversary. These approaches being successful, I propose to use them along with intrusion detection techniques for identifying compromised routers to increase overall network security significantly by marginalizing the working boundaries of an adversary, thus risking exposure. A practical implementation validates our claim.

Authors and Affiliations

M. Kiranbabu

Keywords

Related Articles

UNFAIR TERMINATION OF EMPLOYMENT AT WORKPLACES

In the 18th to the 19th century, the world stated to experience major changes in the means of productions, changes in agriculture, mining, transportation, manufacturing and technology. These changes made a major turning...

Agricultural Water Saving Irrigation Controller

Agricultural irrigation uses considerable volumes of water, and is one of the largest groups of consumptive water uses in the state. The water efficiency practices listed in this fact sheet describe how to reduce excess...

Electro Chemical Comparative Studies Of Ortho, Meta and Para Nitro Phenols

Nitro phenol exists in three isomeric forms namely ortho, meta and para nitro phenols. Their susceptibility for electrochemical oxidation was studies by cyclic voltammetric method and polarization studies. Plenty of chem...

Identification of Sickle cells from Microscopic Blood Smear Image Using Image Processing

Blood is a connective tissue in fluid form. Blood cell counting gives vital information about a patient’s health. It is used to evaluate and diagnose diseases such as anaemia, polycythemia, leukemia, thrombocytosis throm...

Teixobactin: A Novel Antibiotic in 30 Years and the Key to Beat Resistance

Teixobactin, is first new type of antibiotic in 30 years with properties that minimise development of bacterial resistance. It is discovered by scientist from Northeastern University and Novobiotic Pharmaceuticals by iso...

Download PDF file
  • EP ID EP221073
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

M. Kiranbabu (2014). Security Considerations in Wireless Ad-hoc Networks Using Commitment Schemas. International journal of Emerging Trends in Science and Technology, 1(8), 1347-1351. https://europub.co.uk/articles/-A-221073