Abstract

There has been a great increase in the use of wireless networks over the years; Mobile Ad hoc Network is an example of such wireless network. It functions without any central administration and the network is made up of a collection of nodes within a radio frequency. Security in mobile network has been an area of great research over the years mainly because most ad hoc protocols do not provide the basic security framework and services. This paper aims at simulating access control in wireless ad-hoc networks. The objectives are to ensure that the network is not vulnerable and should also devoid of any form of malicious attack that could prevent authorized access. Two metrics (packet delivery ratio and traffic overhead) were used to measure the effectiveness and efficiency of the networks. Through a detailed simulation study, we show that the protocol is efficient and allows a trade-off between security and performance. This research focuses on designing an access control mechanism that was incorporated within ad-hoc routing protocols with the aim of adding an extra layer of security against threats in the network. The three stage-process for access control was implemented with NS-2 v 35. The nodes in the simulation were created dynamically, the movement between nodes was generated randomly and the connections between the nodes were done using Constant Bit Rate (CBR) connection which was aimed at enabling the network to mimic a real life scenario. Through different experiments and simulations done, it was observed that the access control model works and also provides a higher level of security for ad-hoc networks even when under security threats and attacks.

Highlights

  • The notion of “Access Control” is viewed among entities engaged in various protocols as a set of relations established on the basis of a body of supporting assurance evidence and required by specified policies

  • Authentication and access-control trust relation established as a consequence of supporting trust evidence are later used in authorizing client relations and trust evidence are prevalent in mobile ad-hoc often

  • Summary and Conclusion The designed access network protocol is a lightweight hop-by-hop authentication protocol for network access control in ad hoc networks. It is based on two techniques: (i) hop-by-hop authentication for packet authentication and for reducing the overhead for establishing trust among nodes

Read more

Summary

Introduction

The notion of “Access Control” is viewed among entities (e.g., domains, principals, components) engaged in various protocols as a set of relations established on the basis of a body of supporting assurance (trust) evidence and required by specified policies (e.g., by administrative procedures, business practice, law). Authentication and access-control trust relation established as a consequence of supporting trust evidence are later used in authorizing client relations and trust evidence are prevalent in mobile ad-hoc often as certificates and as trust links (e.g., hierarchical or peer links) among the principals included in these relations or among their “home domains.”. Both certificates and access control are networks (MANETs) (Gorasia, Srikanth, Doshi and Rupareliya, 2016). We focus on authentication and accesscontrol trust in this work, similar notions can be defined for “correctness” trust relations required by system

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call