• DocumentCode
    678555
  • Title

    A time space cryptography hashing solution for prevention Jellyfish reordering attack in wireless adhoc networks

  • Author

    Patel, Hetal P. ; Chaudhari, M.B.

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Gov. Eng. Collage, Gandhinagar, India
  • fYear
    2013
  • fDate
    4-6 July 2013
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    In this paper, we propose a new scheme for preventing the jellyfish reordering attack. Jellyfish attack is a new denial of service attack that exploits the end to end congestion control mechanism of TCP (Transmission Control Protocol). The main goal of the Jellyfish nodes is to reduce the goodput of all the flows by either reordering the packets or dropping a small fraction of packets. The proposed scheme uses time-space cryptography and modified SHA-1 (mSHA-1) hash function for verifying whether packets are Reorder or not. This is implemented by modify AOMDV routing protocol using NS-2.35 network simulator. The simulation results show that the solution is effective in increasing the performance of the network.
  • Keywords
    ad hoc networks; cryptographic protocols; routing protocols; time-domain analysis; AOMDV routing protocol; NS-2.35 network simulator; TCP; denial of service attack; end to end congestion control mechanism; jellyfish reordering attack; mSHA-1 hash function; modified SHA-1 hash function; time-space cryptography; transmission control protocol; wireless ad hoc network; Ad hoc networks; Cryptography; Packet loss; Routing protocols; Wireless networks; AOMDV Protocol; Jellyfish Reorder attack; keyed hash function; wireless adhoc networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
  • Conference_Location
    Tiruchengode
  • Print_ISBN
    978-1-4799-3925-1
  • Type

    conf

  • DOI
    10.1109/ICCCNT.2013.6726689
  • Filename
    6726689