Abstract
Mobile Ad hoc NETworks (MANETs), characterized by the free move of mobile nodes are more vulnerable to the trivial Denial-of-Service (DoS) attacks such as replay attacks. A replay attacker performs this attack at anytime and anywhere in the network by interception and retransmission of the valid signed messages. Consequently, the MANET performance is severally degraded by the overhead produced by the redundant valid messages. In this paper, we propose an enhancement of timestamp discrepancy used to validate a signed message and consequently limiting the impact of a replay attack. Our proposed timestamp concept estimates approximately the time where the message is received and validated by the received node. This estimation is based on the existing parameters defined at the 802.11 MAC layer.
Highlights
Mobile Ad hoc NETwork (MANET) [1] is consisted of mobile nodes MNs which can be either router or normal nodes, are able to communicate by using wireless network interfaces without the aid of any fixed infrastructure or centralized administration
We propose an enhancement of timestamp discrepancy used to validate a signed message and limiting the impact of a replay attack
In a MANET, communications between MNs are articulated on the 802.11 MAC layer protocol that is vulnerable to DoS attacks [4,16,17,18,19,20]
Summary
Mobile Ad hoc NETwork (MANET) [1] is consisted of mobile nodes MNs which can be either router or normal nodes, are able to communicate by using wireless network interfaces without the aid of any fixed infrastructure or centralized administration. When the most known attacks can be avoided, replay attacks are still subject of various research works due to their easy technique based on recording and re-sending a valid signed messages in the network. To avoid those replay attacks in MANET, a timestamp concept is developed [12,13,14,15]. The choice of the threshold t is large enough and consequent MANET becomes more exposed to a wide range of DoS attacks including replay attacks In this attack, the objective of the attacker is to resend the intercepted signed messages without exceeding the threshold defined by the timestamp discrepancy in the beginning of a communication.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have