DocumentCode :
245879
Title :
Is Really NACK Protocol Secure to Be Employed in MANETs?
Author :
Saeed, Maryam ; Mackvandi, Ali ; Taghavi, Mehdi ; Bidoki, Mohammad Zare ; Ghasemi, Mehdi ; Neshati, Ali
fYear :
2014
fDate :
19-21 Dec. 2014
Firstpage :
1644
Lastpage :
1647
Abstract :
MANET, which stands for Mobile Ad-hoc Network, is composed of a group of self-organized and wireless nodes that do not possess any predictable and fixed infrastructure. When nodes want to communicate with each other, they have to pass on their messages directly or indirectly. In case the destination node is out of the transmission range, the source node has to rely on intermediate nodes, which, in this case, is called indirect transmission. On the other hand, if the destination node is the neighboring node, there is no need to employ intermediate nodes, which, in this case, is called direct transmission. Over the past years, security issues in MANETs have received a great deal of attention due to their extensive applications in, for instance, disaster relief efforts, military battlefields, conference venues, and so on. Because of that, quite a few protocols have been proposed in this realm. In this paper, it is tried to analyze NACK protocol from the security standpoint. NACK was proposed by Sun et al. In 2012. Unfortunately, the proposed scheme not only has some technical problems, it is vulnerable to the man-in-the-middle attack as well, which is a kind of routing misbehavior attack. In the end, some countermeasures are proposed against the mentioned flaw and vulnerability.
Keywords :
cryptographic protocols; mobile ad hoc networks; routing protocols; MANET; NACK protocol; destination node; indirect transmission; intermediate nodes; man-in-the-middle attack; mobile ad-hoc network; neighboring node; routing misbehavior attack; security issues; self-organized nodes; source node; wireless nodes; Ad hoc networks; Mobile computing; Nickel; Peer-to-peer computing; Protocols; Routing; Security; MANET security; man-in themiddle attack; vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Science and Engineering (CSE), 2014 IEEE 17th International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4799-7980-6
Type :
conf
DOI :
10.1109/CSE.2014.302
Filename :
7023813
Link To Document :
بازگشت