Authentication Process Using Secure Sum for a New Node in Mobile Ad Hoc Network

Wireless Mobile Ad hoc Networks (MANET) provide the facility of quick deployment. Ad hoc networks are useful in various situations, where the time for planning of network deployment is not enough. They set on the fly concept. Most of the setups are unplan

  • PDF / 341,647 Bytes
  • 8 Pages / 439.37 x 666.142 pts Page_size
  • 49 Downloads / 192 Views

DOWNLOAD

REPORT


1 Introduction Wireless MANETs are deployed by using many independent nodes. These nodes are self-organized nodes. The network has nodes with high mobility. Nodes communicate either directly (when they are in the communication range) or indirectly (using intermediate nodes for data forwarding). MANET can be created at the time of requirement. These networks can easily be established in such areas or situations, where deployment of a wired network is not feasible. With these advantages, a MANET has several disadvantages like node transfers data over an open channel, highly mobile nature of node requires up-to-date location information, nodes are having less computing resources like processing power, less battery power, lesser bandwidth, and may have short life span [1–4]. These features make a MANET more vulnerable. A malicious node tries to access resources without permission. It is the responsibility of the network establisher to design a network with security features. Some MANET does not need high-level security while some may need high security [5]. It depends on the situation for which a MANET is deployed. Rest of the paper is covered in the following sections. Section 2 describes the security issues in mobile ad hoc network. Section 3 is a literature review. Section 4 explains the proposed algorithm, result, and analysis of results. Section 5 concludes the work.

P. Gupta (B) · P. Bansal Information Technology, IET, Devi Ahilya Vishwavidyalaya, Indore, MP, India e-mail: [email protected] P. Bansal e-mail: [email protected] © Springer Nature Singapore Pte Ltd. 2019 R. K. Shukla et al. (eds.), Data, Engineering and Applications, https://doi.org/10.1007/978-981-13-6351-1_7

77

78

P. Gupta and P. Bansal

2 Security Issues in Mobile Ad Hoc Network Various attacks are possible in MANET. Attacks may occur either from inside or from outside of the network. An intruder is either part of the system or a stranger. It compromises legitimate nodes to get the information [6]. The format of their attack is to access information or data actively or passively. In passive format, an attacker only listens to floating information. In active format, an attacker steals information and either deletes or modifies it. In all the cases, tampering or loss of any data is crucial to complete the goal for which MANET is set up [7]. Sometimes these attacks are done to choke the network activities so that network can be unavailable to its users. This can be done by sending many requests to a genuine node and keep it busy to reject other service requests. It is termed as Denial of Service (DoS) attack [4, 8]. A malicious node does packet flooding in the network and all other nodes waste their resources in the processing of these packets. Many such DoS attacks like jamming, packet injection, blackhole, wormhole, etc., are possible in the network. In some other attacks, malicious node targets routing information. They misguide other nodes in the network by providing false, old or modified route details. All security features: privacy