Abstract

Mobile ad-hoc networks (MANET) is a network mode that does not depend on network infrastructure and central access. The fast and flexible networking mode of MANET renders its wide applications in specific scenarios. However, rapidly changing topology and open channels bring potential security problems. In this paper, we proposed an active-routing authentication scheme (AAS) based on the characteristics of active routing protocols. We formally demonstrated that the AAS is effective against selective forwarding attack, false routing attack, byzantine attack and route spoofing attack using the BAN logic considering the possibility of malicious nodes mingling in MANET. Experimental results show that the AAS is compatible with multiple active routing protocols and it is able to increase the packet delivery rate by 33.9%, with an average increase of 18.4% in the network containing some malicious nodes. Furthermore, the AAS is robust which remains the average network connection rate reach 1.6 times of the collusion attack prevention-OLSR(Cap-OLSR) protocol and preserves 79.2% of the network performance in simulation experiments with attacks from malicious nodes.

Highlights

  • Mobile ad-hoc networks (MANET) [1] is a self-configuring wireless network consisting of wireless devices with mobility

  • MANET has the characteristic of minimal configuration and rapid deployment, which is suitable for emergency situation scenarios such as natural disasters, military conflicts and emergency medical care, etc

  • 2) We formally demonstrated that the authentication scheme (AAS) is effective against selective forwarding attack, false routing attack, byzantine attack and route spoofing attack using the BAN logic considering the possibility of malicious nodes mingling in the network

Read more

Summary

INTRODUCTION

Mobile ad-hoc networks (MANET) [1] is a self-configuring wireless network consisting of wireless devices with mobility. In MANET with active routing protocols, it is a challenge to prevent nodes that does not pass the authentication from affecting the construction of topology and routing table of the network. It can be seen that the expiration mechanism of shielding rules can effectively resist byzantine attack from the false-positive nodes and avoid the network paralysis caused by no node available in the network. Because the AAS is based on the active routing protocols, each node needs to maintain the global topological information. They need to preserve an A_Set and a N_Set for AAS, so the space complexity is O(n), where n is the capacity of the network

LOGIC PROOF
ROBUSTNESS
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.