DocumentCode :
3240469
Title :
An approach to defend against wormhole attack in ad hoc network using digital signature
Author :
Sharma, Pallavi ; Trivedi, Aditya
Author_Institution :
ABV - IIITM, Gwalior, India
fYear :
2011
fDate :
27-29 May 2011
Firstpage :
307
Lastpage :
311
Abstract :
Ad hoc networks are vulnerable due to their structure less property. A Mobile Ad-Hoc Network (MANET) is an infrastructure less collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources. They also have capability of network partition. The Wormhole attack is the most attention seeking attack in ad hoc networks; it consists of two malicious nodes and a tunnel between malicious nodes. In wormhole attack, attacker records the packets at one location and tunnels them in another location in same network or in different network. In this paper, we present a mechanism which is helpful in prevention of wormhole attack in ad hoc network is verification of digital signatures of sending nodes by receiving node because each legitimate node in the network contains the digital signature of every other legitimate nodes of same network. In proposed solution, if sender wants to send the data to destination, firstly it creates a secure path between sender and receiver with the help of verification of digital signature. If there is presence of any malicious node in between the path then it is identified because malicious node does not have its own legal digital signature.
Keywords :
digital signatures; mobile ad hoc networks; mobility management (mobile radio); radio receivers; telecommunication network topology; MANET; digital signature verification; geographic location; malicious node tunnel; mobile ad-hoc network; mobile node; network dynamic topology; network partition; random mobility; receiving node; sending node; wormhole attack; Earthquakes; Routing; World Wide Web; Mobile ad hoc network; digital signatures; multipath hop count analysis (MHA); routing Protocols; wormhole attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on
Conference_Location :
Xi´an
Print_ISBN :
978-1-61284-485-5
Type :
conf
DOI :
10.1109/ICCSN.2011.6014728
Filename :
6014728
Link To Document :
بازگشت