DocumentCode
678555
Title
A time space cryptography hashing solution for prevention Jellyfish reordering attack in wireless adhoc networks
Author
Patel, Hetal P. ; Chaudhari, M.B.
Author_Institution
Dept. of Comput. Sci. & Eng., Gov. Eng. Collage, Gandhinagar, India
fYear
2013
fDate
4-6 July 2013
Firstpage
1
Lastpage
6
Abstract
In this paper, we propose a new scheme for preventing the jellyfish reordering attack. Jellyfish attack is a new denial of service attack that exploits the end to end congestion control mechanism of TCP (Transmission Control Protocol). The main goal of the Jellyfish nodes is to reduce the goodput of all the flows by either reordering the packets or dropping a small fraction of packets. The proposed scheme uses time-space cryptography and modified SHA-1 (mSHA-1) hash function for verifying whether packets are Reorder or not. This is implemented by modify AOMDV routing protocol using NS-2.35 network simulator. The simulation results show that the solution is effective in increasing the performance of the network.
Keywords
ad hoc networks; cryptographic protocols; routing protocols; time-domain analysis; AOMDV routing protocol; NS-2.35 network simulator; TCP; denial of service attack; end to end congestion control mechanism; jellyfish reordering attack; mSHA-1 hash function; modified SHA-1 hash function; time-space cryptography; transmission control protocol; wireless ad hoc network; Ad hoc networks; Cryptography; Packet loss; Routing protocols; Wireless networks; AOMDV Protocol; Jellyfish Reorder attack; keyed hash function; wireless adhoc networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
Conference_Location
Tiruchengode
Print_ISBN
978-1-4799-3925-1
Type
conf
DOI
10.1109/ICCCNT.2013.6726689
Filename
6726689
Link To Document