By Topic

A Novel Method for Detection and Elimination of Modification Attack and TTL Attack in NTP Based Routing Algorithm

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Vaithiyanathan ; Dept. of ECE, SSN Coll. of Eng., Chennai, India ; Gracelin Sheeba R. ; Edna Elizabeth N. ; S. Radha

An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a mobile ad-hoc network (MANET). Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR, and NTP are used. As the network is wireless, security becomes the major issue in Mobile Ad hoc Networks. Some of the attacks such as modification, fabrication, impersonation and denial of service attacks are due to misbehavior of malicious nodes, which disrupts the transmission. To avoid such attacks some of cryptographic algorithms and key management schemes are used. There are some existing security protocols such as ARAN, SAODV and SEAD etc and will be compared with the proposed algorithm. In this paper, new key management scheme is implemented in NTP protocol, since Node Transition Probability (NTP) based algorithm provides maximum utilization of bandwidth during heavy traffic with less overhead. NTP determines stable routes using received power, but the packet delivery cannot be guaranteed since it is a non secured protocol. The proposal detects the modification, impersonation attacks and TTL attacks and, avoids the effects of malicious node and determines appropriate measures to discard such malicious nodes in dynamic condition.

Published in:

Recent Trends in Information, Telecommunication and Computing (ITC), 2010 International Conference on

Date of Conference:

12-13 March 2010