A Novel method for Detection and Elimination of Modification Attack and TTL
#1

A Novel method for Detection and Elimination of Modification Attack and TTL attack in NTP based routing algorithm
Abstract:
An ad-hoc network is a multi-hop wireless network whereall nodes cooperatively maintain network connectivity without acentralized infrastructure. If these nodes change their positionsdynamically, it is called a mobile ad-hoc network (MANET). Sincethe network topology changes frequently, efficient adaptive routingprotocols such as AODV, DSR, and NTP are used. As the networkis wireless, security becomes the major issue in Mobile Ad hocNetworks. Some of the attacks such as modification, fabrication,impersonation and denial of service attacks are due to misbehaviorof malicious nodes, which disrupts the transmission. To avoid suchattacks some of cryptographic algorithms and key managementschemes are used. There are some existing security protocols suchas ARAN, SAODV and SEAD etc and will be compared with theproposed algorithm. In this paper, new key management scheme isimplemented in NTP protocol, since Node Transition Probability(NTP) based algorithm provides maximum utilization of bandwidthduring heavy traffic with less overhead. NTP determines stableroutes using received power, but the packet delivery cannot beguaranteed since it is a non secured protocol. The proposal detectsthe modification, impersonation attacks and TTL attacks and,avoids the effects of malicious node and determines appropriatemeasures to discard such malicious nodes in dynamic condition.
Keywords: malicious, modification attack, NTP, security,cryptography
I. INTRODUCTION
Wireless communication enables information transferamong a network of disconnected, and often mobile, users.Popular wireless networks such as mobile phone networksand wireless LANs are traditionally infrastructure-based, i.e.base stations, access points and servers are deployed beforethe network can be used. In contrast, ad hoc networks aredynamically formed amongst a group of wireless users andrequire no existing infrastructure or pre-configuration.Mobile nodes within each other's radio range, communicatedirectly via wireless links, while those that are far apart relyon other nodes to relay messages as routers. A mobile ad-hocnetwork can also be used to provide crisis managementservices applications, such as in disaster recovery, where theentire communication infrastructure is destroyed andresorting communication quickly is crucial. Ad hoc networkscan also plays a role in tele-geoprocessing applications(combination of geographical information system and globalpositioning system), tele medicine, military operations etc.
A. SECURITY CONSIDERATION IN AD HOCNETWORK
In general, any wireless networks are highly vulnerable tosecurity attacks and dealing with this is one of the mainchallenges of developers of these networks today. The mainreasons for this difficulty are;shared broadcast radio channelinsecure operating environmentlack of central authoritylack of association among nodeslimited availability of resources andphysical vulnerabilitySeveral popular ad hoc routing protocols are addressed tomany different types of attacks, such as modification,impersonation, and fabrication etc. [5-6]. In addition,several attacks are possible like Data packets can bedropped, replayed, or redirected.Generally, when considering the security of a network, inthis paper, it is examined under the headings such asavailability, confidentiality, authentication, integrity andnon-repudiation.
Availability refers to the fact that the network must remainoperational at all times despite denial of service attacks (Inthis paper the keys that are generated are not handled byany central authority, instead the source itself acts as thecentral authority and hence keys are available wheneverrequired. The source will generate the keys initially forwhichever node acts as the destination and source.
Confidentiality ensures that certain information is neverdisclosed to certain users. Authentication is the ability of anode to identify the node with which it is communicating (Inthis paper the problem of impersonation attack can beovercome by the new method of key generation SNTP.Thus, this authentication method provides solution foranother attack such as “Impersonation attack” therebyauthenticating the source and the destination.
Integrity guarantees that a message is never corruptedwhen transferred (The modification of data is overcome bythe MDE method discussed in the paper section 2.2 therebyovercoming the problem of modification attack.
Non-repudiation states that the sender of the messagecannot deny having sent it


Download full report
http://ieeexplore.ieeeiel5/5406659/54158...er=5415901
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: hplc method of methylcobalamin and gabapentinda, dns ttl, seminar topics with modification, ping ttl, elimination, seminar on hind limb and their modification, vanos elimination,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A New Cell-Counting-Based Attack against Tor 1 744 14-02-2017, 11:26 AM
Last Post: ijasti
  SUSPICIOUS EMAIL DETECTION seminar class 11 7,856 21-04-2016, 11:16 AM
Last Post: dhanabhagya
  DATA LEAKAGE DETECTION project topics 16 13,180 31-07-2015, 02:59 PM
Last Post: seminar report asees
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 2,991 26-05-2015, 03:04 PM
Last Post: seminar report asees
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 4,741 27-01-2015, 12:09 AM
Last Post: Guest
  Credit Card Fraud Detection Using Hidden Markov Models alagaddonjuan 28 20,757 04-09-2014, 11:31 PM
Last Post: Charlescic
  Digital Image Processing Techniques for the Detection and Removal of Cracks in Digiti electronics seminars 4 4,911 22-07-2013, 09:37 PM
Last Post: Guest
  OBSTACLE DETECTION AND AVOIDANCE ROBOT seminar surveyer 5 7,607 24-06-2013, 10:44 AM
Last Post: computer topic
  Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet electronics seminars 6 3,327 26-04-2013, 01:58 PM
Last Post: Guest
  Intelligent system for Gas, Human detection and Temperature Monitor control using GSM seminar surveyer 3 3,500 17-04-2013, 11:37 PM
Last Post: [email protected]

Forum Jump: