This document proposes a Tiered Authentication scheme called TAM for multicast traffic in ad-hoc networks. TAM exploits network clustering to reduce overhead and ensure scalability. Within a cluster, one-way hash chains authenticate message sources by appending an authentication code to messages. Between clusters, messages include multiple authentication codes based on different keys from the source to authenticate it. TAM aims to securely deliver multicast traffic while addressing challenges like resource constraints and packet loss in ad-hoc networks.
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS) with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
In this paper, we introduce and discuss an approach that will be used to secure the DSDV routing protocol in an ad-hoc network. Due to mobility and absence of infrastructure, nodes are more vulnerable to several malicious attacks. The secure routing is essential to transmit packets from source to the destination. Our approach consists to model and manage fidelity concept in an ad-hoc clustering architecture. Clustering makes it possible to group the mobile nodes and to send data simultaneously to the each group. Our security model thus aims to integrate mechanisms against black hole attacks, forcing cooperation between nodes and detecting failing behaviors. The nodes present in the clusters will work more efficiently and the message passing within the nodes will also get more authenticated from the cluster heads. The simulation of our proposed algorithm is carried out using NS2 network simulator by evaluating some network performances such as average delay, throughput of communication and packets loss.
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
The Mobile Adhoc Network (MANET) is a wireless network model for infrastructure-less communication, and it provides numerous applications in different areas. The MANET is vulnerable to a Black-hole attack, and it affects routing functionality by dropping all the incoming packets purposefully. The Black-hole attackers pretend that it always has the best path to the destination node to mislead the source nodes. Trust is the critical factor for detecting and isolating the Black-hole attackers from the network. However, the harsh channel conditions make it difficult to differentiate the Black-hole routing activities and accurate trust measurement. Hence, incorporating the consensus-based trust evidence collection from the neighbouring nodes improves the accuracy of trust. For improving the accuracy of trust, this work suggests Consensus Routing and Environmental DIscrete Trust (CREDIT) Based Secure AODV. The CREDIT incorporates Discrete and Consensus trust information. The Discrete parameters represent the specific characteristics of the Black-hole attacks, such as routing behaviour, hop count deviation, and sequence number deviation. The direct trust accurately differentiates the Black-hole attackers using Discrete parameters, only when the nodes perform sufficient communication between the nodes. To solve such issues, the CREDIT includes the Consensus-based trust information. However, secure routing against the Black-hole attack is challenging due to incomplete preferences. The in-degree centrality and Importance degree measurement on the collected consensus-based trust from decisionmakers solve the incomplete preference issue as well as improves the accuracy of trust. The performance of the proposed scheme is evaluated using Network Simulator-2 (NS2). From the simulation results, it is proved that the detection accuracy and throughput of the proposed CREDIT are substantially high and the proposed CREDIT scheme outperforms the existing work.
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS) with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
In this paper, we introduce and discuss an approach that will be used to secure the DSDV routing protocol in an ad-hoc network. Due to mobility and absence of infrastructure, nodes are more vulnerable to several malicious attacks. The secure routing is essential to transmit packets from source to the destination. Our approach consists to model and manage fidelity concept in an ad-hoc clustering architecture. Clustering makes it possible to group the mobile nodes and to send data simultaneously to the each group. Our security model thus aims to integrate mechanisms against black hole attacks, forcing cooperation between nodes and detecting failing behaviors. The nodes present in the clusters will work more efficiently and the message passing within the nodes will also get more authenticated from the cluster heads. The simulation of our proposed algorithm is carried out using NS2 network simulator by evaluating some network performances such as average delay, throughput of communication and packets loss.
Hiding message from hacker using novel network techniquesPriyangaRajaram
we address the trouble of selective jamming attacks in wireless networks. In these assaults, the adversary is energetic best for a brief period of time, selectively concentrated on messages of excessive significance. We illustrate the benefits of selective jamming in phrases of network performance degradation and adversary effort with the aid of offering case research. A selective assault on TCP and one on routing. We show that selective jamming attacks can be launched with the aid of performing actual-time packet classification at the physical layer. To mitigate these attacks, we develop 3 schemes that prevent actual-time packet class via combining cryptographic primitives with physical-layer attributes. We analyze the security of our strategies and examine their computational and communication overhead.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
Wireless Sensor Network contain number of nodes. Lifetime of Sensor nodes depend on their battery
power, which cannot be reenergize. Thus, to save the node energy & lifetime of the Network energy efficient
LEACH protocol is introduced. Wireless sensor networks are facing many experiments such as the partial source
in processing power, storage and energy. The inadequate energy source is one of the main tasks facing the security
in such networks. LEACH doesn’t shield the safety harms. So we want to improve security scenario of Secure
LEACH protocol. Hierarchical or cluster base routing protocol for WSNs is the most energy-efficient among other
routing protocols. This paper shows different security mechanism used in LEACH protocol. This all protocol is
based on Hierarchical routing protocol. This paper shows basic scenario of security in LEACH.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...ijasuc
The varieties of studies in the literature have been addressed by the researchers to solve security
dilemmas of Mobile Ad-Hoc Networks (MANET). Due to the wireless nature of the channel and specific
characteristics of MANETs, the radio interference attacks cannot be defeated through conventional
security mechanisms. An adversary can easily override its medium access control protocol (MAC) and
continually transfer packages on the network channel. The authorized nodes keep sending Request-toSend (RTS) frames to the access point node in order to access to shared medium and start data transfer.
However, due to jamming attacks on the network, the access point node cannot assign authorization
access to shared medium. These attacks cause a significant decrease on overall network throughput,
packet transmission rates and delay on the MAC layer since other nodes back-off from the
communication. The proposed method applied for preventing and mitigating jamming attacks is
implemented at the MAC layer that consist of a combination of different coordination mechanisms. These
are a combination of Point Controller Functions (PCF) that are used to coordinate entire network
activities at the MAC layer and RTS/CTS (Clear-To-Send) mechanisms which is a handshaking process
that minimizes the occurrence of collisions on the wireless network. The entire network performance and
mechanism is simulated through OPNET simulation application.
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...CSCJournals
A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets transferred from source to destination successfully, it has been assumed that the routing protocol is good. But, an attacker turns this dealing as a speed breaker and turning point of a highway. So, prevention from attacks and secure packets, a new routing protocol is being introduced in this paper. The proposed routing protocol is called by SNAODV (Secure Node AODV). This paper is also tried to maximize throughput as compared with AODV and SAODV.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
ABSTRACT - Wireless Mesh Networks (WMNs) have emerged as a promising technology because of their wide range of
applications. Wireless mesh networks wireless mesh networks (WMNs) are dynamically self – organizing, self –
configuring, self – healing with nodes in the network automatically establishing an adHoc network and maintaining mesh
connectivity. Because of their fast connectivity wireless mesh networks (WMNs) is widely used in military applications.
Security is the major constrain in wireless mesh networks (WMNs). This paper considers a special type of DoS attack
called selective forwarding attack or greyhole attack. With such an attack, a misbehaving mesh router just forwards few
packets it receives but drops sensitive data packets. To mitigate the effect of such attack an approach called FADE :
Forward Assessment based Detection is adopted. FADE scheme detects the presence of attack inside the network by
means of two-hop acknowledgment based monitoring and forward assessment based detection. FADE operates in three
phases and analyzed by determining optimal threshold values. This approach is found to provide effective defense against
the collaborative internal attackers in WMNs.
A Secure message exchange and anti-jamming mechanism in manetIJSRD
Secure neighbor discovery is the fundamental process in the MANET deployed in aggressive environment. It refers to the process that nodes exchange messages to discover and authenticate each other. It is defenseless to the jamming attack in which the adversary intentionally transmits signals to prevent neighboring nodes from exchanging messages. Existing anti-jamming communications depends on JR-SND. The JR-SND, a jamming-resilient secure neighbor discovery scheme for MANETs based on Random spread-code pre-distribution and Direct Sequence Spread Spectrum (DSSS). In Existing, they prevent the jamming and introduce the anti-jamming mechanism using DSSS introduce the secure message exchange mechanism and prevent the collisions during packet transmission. But in this we lack of introducing to detect the selfish and malicious nodes in the network. For this, in the Future Work we will enhance the work by detecting the selfish nodes using Watchdog and Neighbor Coverage-based Probabilistic Rebroadcast Protocol (NCPR).
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Contatto è il Software Web per l’azienda di servizi(pulizia, sanificazione/disinfestazione etc.) in grado di pianificare, organizzare e gestire l’intero processo di erogazione degli stessi.
Hiding message from hacker using novel network techniquesPriyangaRajaram
we address the trouble of selective jamming attacks in wireless networks. In these assaults, the adversary is energetic best for a brief period of time, selectively concentrated on messages of excessive significance. We illustrate the benefits of selective jamming in phrases of network performance degradation and adversary effort with the aid of offering case research. A selective assault on TCP and one on routing. We show that selective jamming attacks can be launched with the aid of performing actual-time packet classification at the physical layer. To mitigate these attacks, we develop 3 schemes that prevent actual-time packet class via combining cryptographic primitives with physical-layer attributes. We analyze the security of our strategies and examine their computational and communication overhead.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
Wireless Sensor Network contain number of nodes. Lifetime of Sensor nodes depend on their battery
power, which cannot be reenergize. Thus, to save the node energy & lifetime of the Network energy efficient
LEACH protocol is introduced. Wireless sensor networks are facing many experiments such as the partial source
in processing power, storage and energy. The inadequate energy source is one of the main tasks facing the security
in such networks. LEACH doesn’t shield the safety harms. So we want to improve security scenario of Secure
LEACH protocol. Hierarchical or cluster base routing protocol for WSNs is the most energy-efficient among other
routing protocols. This paper shows different security mechanism used in LEACH protocol. This all protocol is
based on Hierarchical routing protocol. This paper shows basic scenario of security in LEACH.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...ijasuc
The varieties of studies in the literature have been addressed by the researchers to solve security
dilemmas of Mobile Ad-Hoc Networks (MANET). Due to the wireless nature of the channel and specific
characteristics of MANETs, the radio interference attacks cannot be defeated through conventional
security mechanisms. An adversary can easily override its medium access control protocol (MAC) and
continually transfer packages on the network channel. The authorized nodes keep sending Request-toSend (RTS) frames to the access point node in order to access to shared medium and start data transfer.
However, due to jamming attacks on the network, the access point node cannot assign authorization
access to shared medium. These attacks cause a significant decrease on overall network throughput,
packet transmission rates and delay on the MAC layer since other nodes back-off from the
communication. The proposed method applied for preventing and mitigating jamming attacks is
implemented at the MAC layer that consist of a combination of different coordination mechanisms. These
are a combination of Point Controller Functions (PCF) that are used to coordinate entire network
activities at the MAC layer and RTS/CTS (Clear-To-Send) mechanisms which is a handshaking process
that minimizes the occurrence of collisions on the wireless network. The entire network performance and
mechanism is simulated through OPNET simulation application.
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc N...CSCJournals
A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets transferred from source to destination successfully, it has been assumed that the routing protocol is good. But, an attacker turns this dealing as a speed breaker and turning point of a highway. So, prevention from attacks and secure packets, a new routing protocol is being introduced in this paper. The proposed routing protocol is called by SNAODV (Secure Node AODV). This paper is also tried to maximize throughput as compared with AODV and SAODV.
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In this paper, we propose a Cluster Based Misbehavior Detection and Authentication scheme using threshold cryptography in MANET. For secure data transmission, when any node requests a certificate from a cluster head (CH), it utilizes a threshold cryptographic technique to issue the certificate to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. An acknowledgement scheme is also included to detect and isolate the misbehaving nodes. By simulation results, we show that the proposed approach reduces the overhead.
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
ABSTRACT - Wireless Mesh Networks (WMNs) have emerged as a promising technology because of their wide range of
applications. Wireless mesh networks wireless mesh networks (WMNs) are dynamically self – organizing, self –
configuring, self – healing with nodes in the network automatically establishing an adHoc network and maintaining mesh
connectivity. Because of their fast connectivity wireless mesh networks (WMNs) is widely used in military applications.
Security is the major constrain in wireless mesh networks (WMNs). This paper considers a special type of DoS attack
called selective forwarding attack or greyhole attack. With such an attack, a misbehaving mesh router just forwards few
packets it receives but drops sensitive data packets. To mitigate the effect of such attack an approach called FADE :
Forward Assessment based Detection is adopted. FADE scheme detects the presence of attack inside the network by
means of two-hop acknowledgment based monitoring and forward assessment based detection. FADE operates in three
phases and analyzed by determining optimal threshold values. This approach is found to provide effective defense against
the collaborative internal attackers in WMNs.
A Secure message exchange and anti-jamming mechanism in manetIJSRD
Secure neighbor discovery is the fundamental process in the MANET deployed in aggressive environment. It refers to the process that nodes exchange messages to discover and authenticate each other. It is defenseless to the jamming attack in which the adversary intentionally transmits signals to prevent neighboring nodes from exchanging messages. Existing anti-jamming communications depends on JR-SND. The JR-SND, a jamming-resilient secure neighbor discovery scheme for MANETs based on Random spread-code pre-distribution and Direct Sequence Spread Spectrum (DSSS). In Existing, they prevent the jamming and introduce the anti-jamming mechanism using DSSS introduce the secure message exchange mechanism and prevent the collisions during packet transmission. But in this we lack of introducing to detect the selfish and malicious nodes in the network. For this, in the Future Work we will enhance the work by detecting the selfish nodes using Watchdog and Neighbor Coverage-based Probabilistic Rebroadcast Protocol (NCPR).
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Contatto è il Software Web per l’azienda di servizi(pulizia, sanificazione/disinfestazione etc.) in grado di pianificare, organizzare e gestire l’intero processo di erogazione degli stessi.
You will find this video very interesting especially at the period of time when it is much spoken about. We created this video to provide you with all the details you need to be mentions in your Immigration Essay. https://essay-academy.com/account/blog/immigration-essay
A Two Tiered Data Origin Authentication Scheme for Adhoc Networkijsrd.com
Ad-hoc networks are becoming an effective tool for many mission critical applications such as troop coordination in a combat field, situational awareness, etc. Therefore, authenticating the source and ensuring the integrity of the message traffic become a fundamental requirement for the operation and management of the network. Since we are using small system in the adhoc network application, memory usage is also an important issue. Here we are presenting a system which reduces the memory attacks and control the memory usage of the devices in the adhoc network. By clustering the adhoc network we also achieve high scalability. One way hash function and MACs are used for the authentication purpose. The simulation demonstrates the advantage of this system to existing system in terms of throughput, memory, delay, etc.
2.espk external agent authentication and session key establishment using publ...EditorJST
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed and deployed in a un attend environment, these are vulnerable to numerous security threats. In this paper, describe the design and implementation of public-key-(PK)-based protocols that allow authentication and session key establishment between a sensor network and a third party. WSN have limitations on computational capacity, battery etc which provides scope for challenging problems. We fundamentally focused on the security issue of WSNs The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs.
An Encrypted MAC for the Authentication Process in WSNIJMTST Journal
Security infringement and energy consumption issues are vital in WSN (wireless sensor networks). Looking at the attacks like Denial-of-Sleep, Man-in-the-Middle, Correlation attack, etc, are affecting the transfer of any data. It might be the data loss or the modification where in the third party access the information to one self. This paper explains how to authenticate the data transfer using the encryption standards in MAC algorithm in a riskless technique.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
Wireless Sensor Networks is an infrastructure less, self-configured, reprogrammable, energy-aware network used
in various applications. Many networks works on security of data including mainly ASCII values but not the non English end users. BDNA cryptography describes how to encrypt non English patterns but which leads to propagation of more bits transmitted means indirectly consumes more energy in WSN. In this we propose new steps to reduce the transmission of more bytes in the network. This gives high propagation speed in the network with minimum hash overhead.
Security in Wireless Sensor Networks Using BroadcastingIJMER
Wireless sensor networks as one of the growing technology in the coming decades has posed various unique challenges to researchers. A WSN typically consists of several base stations and thousands of sensor nodes, which are resource limited devices with low processing, energy, and storage capabilities.While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. As today’s world is growing more towards the Wireless technology, our aim must be towards providing the best security features to Wireless Sensor Network( WSN).We propose some of the security requirements for Wireless Sensor Network. Further, security being vital to the acceptance and use of sensor networks for many applications. We propose an efficient broadcast authentication scheme for wireless sensor networks in this paper.
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
Smart Grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. The advent of the smart grid promises to user in an era that will bring intelligence, efficiency, and optimality to the power grid. Most of these challenges will occur as an Internet-like communications network is super imposed on top of the current power grid using wireless mesh network technologies with the 802.15.4, 802.11 and WiMAX Standards. Each of these will expose the power grid to security threats. Wireless communication offers the benefits of low cost, rapid deployment, shared communication medium, and mobility. It causes many security and privacy challenges. The concept of dynamic secret is applied to design an encryption scheme for smart grid in wireless communication. Between two parties of communication, the previous packets are coded as retransmission sequence, where retransmitted packet is marked as ―1‖ and the other is marked as ―0‖.During the communication, the retransmission sequence is generated at both sides to update the dynamic encryption key. Any missing or misjudging sequence would prevent the adversary from achieving key. A Smart Grid platform is built, employing the ZigBee protocol for wireless communication. The Simulation results show that the retransmission and packet loss in ZigBee communication are inevitable and unpredictable and it is impossible of the adversary to track the updating of dynamic encryption key. Even though the DES scheme can protect the encryption key from attackers, the hackers can obtain the keys some time, due to the block size 64 bits used by DES that makes the adversary (hacker) to hack the data. It introduces vulnerabilities and liner crypt analysis; this can be achieved by using AES scheme. The AES uses 128 bits block size for a single encryption key a data of 256 billion gigabytes can be transmitted thus its provide much more safety to user from hacker and it reduces the end to end delay and increases packet transmission rate.
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...ijsrd.com
An adhoc network is a collection of autonomous nodes with dynamically changing infrastructure. Multicast is a good mechanism for group communication. It can be used in the group oriented applications like video/audio conference, interactive group games, video on demand etc. The security problems obstruct the large deployment of the multicast communication model. Multicast data origin authentication is the main component in the security architecture. The authentication schemes should scalable and efficient against packet loss. In this article we discuss varies authentication scheme for multicast data origin with their advantage and disadvantage
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A NEW GENERATION OF DRIVER ASSISTANCE AND SECURITYIJCI JOURNAL
Vehicular ad hoc networks are tremendously and very effectively used for safety related applications. Especially
for driver assistance and when it comes to safety of either from an accident or stealing of data VANET is the future of the all such problems.”A New Generation of Driver Assistance and Security” gives a idea about VANET and also provide solutions to various problems comes in this. Authentication will be provided by Group signature and Identity based (ID- based) Signature scheme. The scheme Provides cost effective, highly privacy
preserving of user, efficient message authentication and verification than existing system for VANETs. This
required CA (Central Authority) and LA (Local Authority) where LA is group leader and which has to concern with CA. This safety technique is efficient, robust, and scalable for VANET’s authentication and provide reallife solution match with the standard.
1. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 1
CHAPTER 1
INTRODUCTION
The continual advancement in wireless technologies has enabled networked-solutions
for many nonconventional civil and military applications. In recent years ad-hoc networks
have been attracting increased attention from the research and engineering community,
motivated by applications like digital battlefield, asset tracking, air-borne safety, situational
awareness, and border protection. In these network applications, it is important to devise
efficient network management solutions suitable for nodes that are constrained in onboard
energy and in their computation and communication capacities. In addition, the solutions
must be scalable to support networks covering vast areas with a large set of nodes that
communicate over many hops. These characteristics make the design and management of ad-
hoc networks significantly challenging in comparison to contemporary networks.
Group communication is considered a critical service in adhoc networks due to their
inherently collaborative operations, where the nodes cooperate in network management and
strive to accomplish common missions autonomously in highly unpredictable environment
without reliance on infrastructure equipment. For example, in combat missions troops report
their status and share observed data in order to become aware of the overall situation and
coordinate their actions. In addition, it is common for ad-hoc networks to rely on multicast
for management-related control traffic such as neighbor/route discovery to setup multi-hop
paths, the establishment of time synchronization, etc. Such multicast traffic among the nodes
has to be delivered in a secure and trusted manner. In particular the provided network
services need to achieve the following security goals: (1) Confidentiality, to prevent
adversaries from reading transmitted data, (2) Message integrity, to prevent tampering with
transmitted messages, and (3) Source Authentication, to prevent man-in-the-middle attacks
that may replay transmitted data for node impersonation. Confidentiality is achieved by
encrypting the transmitted data. The work presented in this paper aims at addressing the
second and third goals. Providing an efficient multicast message and source authentication
security service that can easily scale for large networks is an important capability for the
operation and management of the underlying network.
2. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 2
1.1 CHALLENGES AND DESIGN GOALS
Multiple factors make multicast authentication in ad-hoc networks very challenging.
The issues are fundamentally due to the resource constraints and the wireless links. First,
nodes have limited computing, bandwidth, and energy resources which make the overhead of
basic asymmetric key-pair cryptography methods very expensive. In addition, the unstable
wireless links due to radio interference cause frequent packet loss errors and require a
security solution that can tolerate missed packets, as well as differentiate between packet
retransmission and replay. Furthermore, the instability of the wireless links makes it unwise
to rely on the continual involvement of a trusted authority in the generation and sharing of
session keys since a stable connection cannot be guaranteed. On the other hand, while basic
symmetric key cryptography methods are efficient, they are ineffective for multicast traffic
patterns; since using a common key for all receivers will make it relatively easy to
impersonate a sender by any of the receiving nodes.
In addition to being resource efficient and robust to packet loss, a security solution
should scale for large group of receivers and long multi-hop paths. Thus, a solution that is
based on a distinct authentication key for every receiver will introduce prohibitive overhead
to the message and consume significant portion of the available bandwidth. Moreover, the
solution should scale for large number of senders by requiring reasonable memory resources
at the individual receivers for storing authentication keys. Finally, it is desired to enable the
validation of every packet without excessive delay and independent of the other packets. This
goal would affect when the authentication code of a packet will be sent and how sensitive the
security scheme will be to an occasional delay or a loss of some packets. The motive is that
some data may be urgent, e.g. a report on an enemy tank, and should be acted upon as soon as
possible, and thus the authenticity of the source should be verified rapidly.
3. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 3
1.2 CONTRIBUTION AND ORGANISATION
This paper proposes a new Tiered Authentication scheme for Multicast traffic (TAM)
for ad-hoc networks. TAM exploits network clustering in order to cut overhead and ensure
scalability. Multicast traffic within the same cluster employs one-way hash chains to
authenticate the message source. The authentication code is appended to the message body.
However, the authentication key is revealed after the message is delivered. The idea is similar
to the Timed Efficient Stream Loss-tolerant Authentication (TESLA) system [4]. The
relatively small-sized cluster would make it possible to keep the nodes synchronized and
address the maximum variance in forwarding delay issue of message authentication within a
cluster. On the other hand, cross-cluster multicast traffic includes message authentication
codes (MACs) that are based on multiple keys. Each cluster looks for a distinct combination
of MACs in the message in order to authenticate the source. The source generates the keys at
the time of establishing the multicast session. The keys will be securely transmitted to the
head of every cluster that hosts one or multiple receivers. The multicast message is then
transmitted to the cluster-heads, which authenticate the source and then deliver the message
to the intended receivers using the intra-cluster authentication scheme. TAM thus combines
the advantages of the secret in-formation asymmetry and the time asymmetry paradigms. The
analytical and numerical results demonstrate the performance advantage of TAM
The paper is organized as follows. The next section covers the related work. The
assumed system model is discussed in the coming chapter. The proposed TAM approach is
described in detail. Analyzes the performance of TAM and derives bounds for the best and
worst case scenarios. The effects on the various parameters on the analytical performance
estimates are discussed. Reports on the simulation validation of TAM and presents the
performance observed in the experiments. Finally, concludes the paper.
4. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 4
CHAPTER 2
SYSTEM ANALYSIS
The analysis of the existing system was carried out to discover the disadvantages of
the system. Then the analysis of the proposed system was done to understand how the
disadvantages of the existing system have been evaded; and also how the proposed system is
better than the existing system. The brief about the two analysis’ are described below.
2.1 EXISTING SYSTEM
Nodes communicated through the Ad-Hoc network.
It is possible by the multi cast protocol.
No trusted certificate is provided because keys are not provided to the nodes.
Tired authentication is not possible.
Data is transferred from source to destination without key.
2.1.1 Disadvantages:
Traffic in multi cast is used by the hostile.
Security is not guaranteed.
There is no authentication to trust the data.
Whether the data may be changed by the opponent.
Key without data increases the vulnerability.
5. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 5
CHAPTER 3
PROPOSED SYSTEM
Multicast protocol is used in the proposed system.
Tired authentication is possible because of multicast protocol.
MAC is used for the authentication purpose of data and source integrity.
Key is shared by the nodes for getting the Message Authentication code.
3.1 ADVANTAGES
Prevent the transmission of data reading by the adversary.
Manipulation of data by hostile is prevented.
Trusted authentication is provided because of MAC .
Original data from source is received by the destination.
6. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 6
CHAPTER 4
SYSTEM REQUIREMENTS
4.1 SOFTWARE REQUIREMENTS
OS : Windows XP
Coding language : Java
IDE : Eclipse
Database : MYSQL server
4.2 HARDWARE REQUIREMENTS
Hard Disk : 250 GB.
Monitor : 15 VGA Color.
Mouse : Logitech.
Ram : 512 MB.
7. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 7
CHAPTER 5
SYSTEM MODEL
It defines about the architectural model and trust and threat of models.
5.1 ARCHITECTURAL MODEL
An ad-hoc network is a collection of autonomous nodes that 0together set up a
topology without the support of a physical networking infrastructure. Depending on the
applications, an ad-hoc network may include up to a few hundreds or even a thousand nodes.
Communications among nodes are via multihop routes using omni directional wireless
broadcasts with limited transmission range. In the system model considered in this paper,
nodes are grouped into clusters. The cluster formation can be based on location and radio
connectivity [17], [18]. It is assumed that clusters are established securely by using pre-
distributed public keys [10], employing a robust trust model [15], [19], or applying identity
based asymmetric key-pair cryptographic methods [11], and that a proper key management
protocol is followed in order to perform reclustering when needed [20], [21]. Clustering is a
popular architectural mechanism for enabling scalability of network management functions.
It has been shown that clustered network topologies better support routing of multicast traffic
and the performance gain dominates the overhead of creating and maintaining the clusters
[22], [23]. Each cluster is controlled by a cluster-head, which is reachable to all nodes in its
cluster, either directly or over multi-hop paths. Fig. 1 shows an articulation of an example
clustered network. Nodes that have links to peers in other clusters would serve as gateways.
The presence of gateways between two clusters implies that the heads of these clusters are
reachable to each other over multi-hop path and that these two clusters are considered
neighbours. If a node moves out its current cluster and joins another, it is assumed that the
associated cluster-heads will conduct a handoff to update each other about the change in
membership of their clusters; other cluster-heads will not be involved in the handoff events
outside their clusters. Mobility is not the focus of this paper; however, prior studies have
shown that clustering is advantageous for multicast routing in mobile environments.
8. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 8
Fig 5.1:Architectural model for the TAM
5.1.1 Trust and Threat Models
Nodes are assumed to have public key certificates or assigned identity-based
asymmetric keys generated by a common trusted authority. These public keys can be used to
form clusters securely [20], [21] and bootstrap TAM. Alternatively, if public key certificates
are not suitable, TAM may employ a robust technique to bootstrap mutual trust among the
individual nodes [24]. We aim to eliminate any need for interaction with the authority to
retrieve the public key of some nodes in the network. TAM bootstrapping will be needed at
the time sessions are established and during the formation of a new cluster.
Fig 5.2:An example clustered ad-hoc network where each node is reachable to its cluster head
via at most 1-hop(2-hop).Nodes that have links to other clusters serve gateways.
9. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 9
Basically, as detailed in Section IV, the source uses asymmetric cryptography to
deliver the session keys to the main players in the authentication process. All nodes are to be
preloaded with a known one-way hash cryptographic function. The function should be proven
secure with extremely low probability that an adversary can determine the input to the
function given its output. This paper mainly considers an adversary who tries to manipulate
the system through capturing and compromising some nodes. When a node is captured, its
memory can be read or tampered with. Therefore, an adversary would know the keys of a
compromised node. In addition, the operation of a compromised node may be manipulated to
launch attacks such as replay, impersonation, etc. [2]. TAM opts to ensure source and
message authentication in order to counter modify, replay and impersonation attacks. Other
attacks are beyond the scope of this paper.
5.2 TIERED AUTHENTICATION OF MULTICAST TRAFFIC
TAM pursues a two-tier process for authenticating multicast traffic in ad-hoc
networks. TAM uses clustering to partition a network, and then authenticates multicast traffic
by employing time asymmetry for intra-cluster traffic and secret information asymmetry for
inter-cluster traffic. As mentioned earlier, clustering is a popular scheme for supporting
scalable network operation and management. Several studies have shown that the gains
achieved by clustering supersede the overheard in forming and maintain the clusters [22],
[23]. TAM leverages such a network management scheme.
5.2.1 Intra-cluster Source Authentication
Grouping nodes into clusters enables having a reasonably tight bound on the end-to-
end delay of packet delivery and will thus enable the use of a time asymmetry based
authentication scheme. Intra-cluster authentication in TAM is based on
10. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 10
Fig 5.3:A source used a key ki during period j and reveals it in period j+1 thus,a packet in
period j will have a MAC based on ki and will also include ki+1 for authenticating the
packet received in period j-1
TESLA [4]. Inter-cluster multicast traffic will be authenticated differently as
explained below. A source node generates a chain of one-time-use keys using the hash
function, e.g., MD5, SHA-1, etc., and shares only that last generated key, Kl, with the
receivers. A message can be authenticated only when the used key in the chain is revealed.
Fig. 2 demonstrates the authentication process. To verify the authentication key, the receiver
recursively applies the cryptographic hash function until reaching Kl. In reality, the receiver
can stop when reaching a key that has been used before. A key cannot be used outside its
designated time interval and the message will be ignored if the MAC is based on an expired
key. Consequently, clock synchronization is required to make sure that the source and
destination have the same time reference for key expiration. Therefore, TAM favours small
cluster diameters as will be shown shortly. The approach has two distinct advantages,
namely:
• The MAC overhead is small; basically a single MAC is used per every multicast packet for
all receivers.
• A missed key in a lost packet would not obstruct the authentication process since a
receiver can refer back to Kl.
11. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 11
Fig 5.4: Illustratating the steps and packet contents whan a node “s” multicast a data packet to
nodes “a1”,”b1”….”x1” according to TAM.
5.2.2 Inter-Cluster Authentication
Authentication based on time asymmetry requires clock synchronization and thus
does not suit large networks. For inter-cluster multicast traffic, TAM applies a strategy based
on secret information asymmetry and engages the cluster heads in the authentication process.
Basically, the source “s” that belongs to Cluster i will send the multicast packets to the heads
of all clusters that have designated receivers. For example, if the members of the multicast
group for s are residing in clusters g, h, j, and k, node s sends the message to CHg, CHh, CHj,
and CHk. These cluster heads will then forward the message to the receivers in their
respective clusters. The rationale is that the MAC will be associated with the cluster rather
than the nodes and thus the overhead is reduced significantly. In other words, the multicast
from s consists of multiple multicasts; (1) from s to all relevant cluster heads, (2) a distinct
multicast within each of the target clusters to relay the message to designated receivers. This
can also be advantageous if node mobility is to be dealt with. A node that switches from one
cluster to another would only introduce local changes and would not require special handling
by the source with respect to the authentication process. The process goes as follows. The
source will generate a pool of M keys. Each of the NCL clusters in the network will be
assigned a share L of keys, with M < L× NCL. The key share will be sent securely, e.g. using
asymmetric cryptographic protocol, to the heads of the individual clusters. The source will
then append multiple MACs to the multicast packet; each MAC is based on a distinct key.
For a broadcast, exactly M MACs will be included in a packet. The source “s” will then
transmit the multicast message to the cluster heads. Each CH j checks the MACs and confirm
the source authenticity when a set of L MACs in the message are found
12. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 12
to be based on the L keys assigned to CH j by s. The value of M and L is subject to trade-off
between security and bandwidth overhead. For L = 1, M needs to be equal to NCL.
Fig 5.5: summary of the TAM inter-cluster operation.Delivery of the multicast message from
a source “s” to all cluster heads applying the TAM inter-cluster authentication and from each
cluter head ,of the designation cluster CH3 and CHa to the target node “a” apply the TAM
intra-cluster protocol.
13. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 13
CHAPTER 6
IMPLEMENTANTION
Implementation of ad-hoc networks can be possible using some modules. There are about
five modules, namely
MAC yielding.
File ciphering using AES and transfer.
CA deployment and data distribution.
File retrieve using AES.
Data integrity checking.
Modules description
6.1 MAC YIELDING:
• Sender selects a file for transmission and creates a Message Authentication
Code (MAC) for data integrity.
• Fetch the Message Authentication Code with its appropriate key to the
transmission file.
6.2 FILE CIPHERING USING AES AND TRANSFER:
• File is ciphered for the purpose of security using AES algorithm by the user
defined key.
• And the file which is encrypted is transferred to the (CA) Central Authority.
14. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 14
6.3 CA DEPLOYMENT AND DATA DISTRIBUTION:
• The file from sender is received by the Central Authority.
• Central Authority sends the appropriate file to the destinations without doing
any change.
6.4 FILE RETRIEVE USING AES:
• The encrypted file from the Central Authority is received by the receiver.
• Receiver retrieves the file by using the AES algorithm.
• Receiver must use the correct key for the decryption of the file.
6.5 DATA INTEGRITY CHECKING:
• Receiver gets the key from the file which is used to generating the MAC.
• And receiver creates the MAC and compared it to the MAC which is received
from the file.
• If there is no change in the two MAC means then the file is not changed and
the integrity is proved.
15. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 15
Fig 6.1 shows the data flow diagram for described module
Start
Sender
File selection
MAC key generation
Appling MAC
AES key
Encryption
File transfer
Append
c
16. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 16
Stop
Receiver 1
File Transfer
Receiver 2
AES key
Decryption
Getting MAC key
AES key
Decryption
Integrity Checking
Applying MAC Applying MAC
Integrity Checking
Getting MAC key
C
CA
17. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 17
CHAPTER 7
SCREENSHOTS
The following screenshots describe the working of described module in form of
implementation:
Screen shot 1: MAC Yielding
18. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 18
Screen shot 2: Data Integrity Checking
19. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 19
CONCLUSION
In recent years there has been a growing interest in the use of ad-hoc networks in
security-sensitive applications such as digital battlefield, situation awareness, and border
protection. The collaborative nature of these applications makes multicast traffic very
common. Securing such traffic is of great importance, particularly authenticating the source
and message to prevent any infiltration attempts by an intruder. Contemporary source
authentication schemes found in the literature either introduce excessive overhead or do not
scale for large networks. This paper has presented TAM, which pursues a two tired
hierarchical strategy combining both time and secret-information asymmetry in order to
achieve scalability and resource efficiency. The performance of TAM has been analyzed
mathematically and through simulation, confirming its effectiveness. In addition, the effect of
the various parameters has been studied and guidelines have been highlighted for picking the
most suitable configuration in the context of the particular application requirements; most
notably having a cluster radius of 2 or 3 hops appears to be the most suitable for TAM. Our
future work plan includes studying the effect of different clustering strategies on the
performance of TAM.
20. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 20
REFERENCES
[1] C. E. Perkins, Ad Hoc Networking. Addison-Wesley, 2001.
[2] H. Yang, et al., “Security in mobile ad-hoc wireless networks: challenges and solutions,”
IEEE Wireless Commun. Mag., vol. 11, no. 1, pp. 1536– 1284, Feb. 2004.
[3] Y. Challal, H. Bettahar, and A. Bouabdallah, “A taxonomy of multicast data origin
authentication, issues and solutions,” IEEE Commun. Surveys & Tutorials, vol. 6, no.
3, pp. 34–57, 2004.
[4] A. Perrig, R. Canetti, D. Song, and D. Tygar, “Efficient authentication and signing of
multicast streams over lossy channels,” in Proc. 2000 IEEE Symposium Security
Privacy.
[5] R. Canetti et al., “Multicast security: a taxonomy and efficient constructions,” in Proc.
1999 IEEE INFOCOM.
[6] R. Safavi-Naini and H. Wang, “Multi-receiver authentication codes: models, bounds,
constructions, and extensions,” Inf. Computation, vol. 151, no. 1–2, pp. 148–172,
May 1999.
[7] Perrig, et al., “Efficient and secure source authentication for multicast,” in Proc. 2001
Network Distributed System Security Symposium.
[8] A. Perrig, “The BiBa one-time signature and broadcast authentication protocol,” in Proc.
2001 ACM Conf. Computer Commun. Security.
[9] L. Reyzin and N. Reyzin, “Better than BiBa: short one-time signatures with fast signing
and verifying,” in Proc. 2002 Australian Conf. Info. Security Privacy, pp. 144–153.
[10] A. M. Hegland, E. Winjum, S. F. Mjolsnes, C. Rong, O. Kure, and P. Spilling, “A
survey of key management in ad hoc networks,” IEEE Commun. Surveys & Tutorials,
vol. 8, no. 3, pp. 48–66, Dec. 2006.
[11] F. R. Yu, H. Tang, P. Mason, and F. Wang, “A hierarchical identity based key
management scheme in tactical mobile ad hoc networks,” IEEE Trans. Netw. Service
Management, vol. 7, no. 4, pp. 258–267, Dec. 2010.
[12] R. Gennaro, et al., “Strongly-resilient and non-interactive hierarchical key-agreement in
MANETs,” in Proc. 2008 European Symp. Research Computer Security.
[13] G. Hanaoka, T. Nishioka, Y. Zheng, and H. Imai, “A hierarchical non-interactive key-
sharing scheme with low memory size and high resistance against collusion attacks,”
Computer J., vol. 45, no. 3, pp. 293–303, 2002.
21. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 21
[14] M. Younis, K. Ghumman, and M. Eltoweissy, “Location-aware combinatorial key
management scheme for clustered sensor networks,” IEEE Trans. Parallel Distrib.
Syst., vol. 17, no. 18, pp. 865–882, Aug. 2006.
[15] E. C. H. Ngai and M. R. Lyu, “An authentication service based on trust and clustering in
wireless ad hoc networks: description and security evaluation,” in Proc. 2006 IEEE
International Conf. Sensor Networks, Ubiquitous, Trustworthy Computing.
[16] Y. Lu, B. Zhou, F. Jia, and M. Gerla, “Group-based secure source authentication
protocol for VANETs,” in Proc. 2010 IEEE GLOBECOM Workshop Heterogeneous,
Multi-hop Wireless Mobile Networks.
[17] M. Youssef, A. Youssef, and M. Younis, “Overlapping multihop clustering for wireless
sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 12, pp. 1844–1856,
Dec. 2009.
[18] J. Y. Yu and P. H. J. Chong, “A survey of clustering schemes for mobile ad hoc
networks,” IEEE Commun. Surveys & Tutorials, vol. 1, no. 1, pp. 31–48, 2005.
[19] P. B. Velloso, et al., “Trust management in mobile ad hoc networks using a scalable
maturity-based model,” IEEE Trans. Network Service Management, vol. 7, no. 3, Sep.
2010.
20] R. Azarderskhsh and A. Reyhani-Masoleh, “Secure clustering and symmetric key
establishment in heterogeneous wireless sensor networks,” EURASIP J. Wireless
Commun. Netw., vol. 2011, article ID 893592, 2011.
[21] L. Wang and F. Gao, “A secure clustering scheme protocol for MANET,” in Proc. 2010
International Conf. Multimedia Inf. Netw. Security.
[22] L. Junhai, Y. Danxia, X. Liu, and F. Mingyu, “A survey of multicast routing protocols
for mobile ad-hoc networks,” IEEE Commun. Surveys & Tutorials, vol. 11, no. 1, pp.
78–91, first quarter 2009.
[23] M. Younis, O. Farrag, and S. Lee, “Cluster mesh based multicast routing in MANET: an
analytical study,” in Proc. 2011 IEEE International Conf. Commun..
[24] D. Balfanz, et al., “Talking to strangers: authentication in ad-hoc wireless networks,” in
Proc. 2002 Network Distrib. System Security Symposium.
[25] K. Marzullo and S. Owicki, “Maintaining the time in a distributed system,” in Proc.
1983 ACM Symposium Principles Distrib. Computing.
[26] A. Savvides, C. C. Han, and M. Srivastava, “Dynamic fine-grained localization in ad-
hoc networks of sensors,” in Proc. 2001 ACM International Conf. Mobile Computing
Netw., pp. 166–179.
22. TAM:A tiered authentication of multicast protocol for ad-hoc networks
DEPARTMENT OF CSE, MSEC Page 22
[27] The Network Simulator - ns-2. Available: http://www.isi.edu/nsnam/ns/
[28] G. Angione, P. Bellavista, A. Corradi, and E. Magistretti, “A k-hop clustering protocol
for dense mobile ad-hoc networks,” in Proc. 2006 IEEE International Conf. Distrib.
Computing Systems Workshop.
[29] E. M. Royer and C. Perkins, “Multicast ad-hoc on-demand distance vector (MAODV)
routing,” Internet Draft, University of California, Charles E. Perkins Nokia Research
Center, July 2000.
[30] Y. Zhu and T. Kunz, “MAODV implementation for NS-2.26,” Technical Report SCE-
04-01, Dept. of Systems and Computing Engineering, Carleton University, Jan. 2004.