Security Considerations in Wireless Ad-hoc Networks Using Commitment Schemas
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 8
Abstract
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Although the attack models are classified as both external and internal with the latter being more serious because the “always-on” strategy employed in external model has several disadvantages. In an internal threat model an adversary is assumed to be aware of network secrets and the implementation details of network protocols at any layer in the network stack. The adversary exploits his internal knowledge for launching selective jamming attacks in which specific messages of “high importance” are targeted. Although RREQ, RREP, RERR, RREP-ACK are primary Message Formats in reactive protocols, the adversary selectively targets RREQ and RREP packets in the network to launch jamming attacks. Prior approaches concentrated on using commitment schemes that are cryptographic primitives to hide the RREQ and RREP packets from the purview of the adversary. These approaches being successful, I propose to use them along with intrusion detection techniques for identifying compromised routers to increase overall network security significantly by marginalizing the working boundaries of an adversary, thus risking exposure. A practical implementation validates our claim.
Authors and Affiliations
M. Kiranbabu
Enhanced Heart Disease Analysis and Prediction System [EHDAPS] Using Data Mining
Data mining is the process of analyzing data from different perspectives and summarizing it into useful information. Data mining techniques are used for variety of applications. Data mining techniques have been very effe...
Quadratic Trend Running CostReplacement Model with Linear Trend Salvage and Predicted Inflation
The paper Quadratic Trend Running Cost Replacement Model with Linear Trend Salvage and Predicted Inflation is an attempt made to develop right replacement strategy to determine an age of equipment at which the replacemen...
Burnt Wives of Agartala: A Retrospective Study From Medico Legal Autopsies of A Tertiary Hospital of Tripura, Northeast India
Introduction: High mortality in young married women from burns is an alarming problem in our country. Materials and Methods: All medico-legal autopsies of burn cases of married women which were performed between January...
An Amazing Traditional Healer of Manipur Solanum Xanthocarpum (Leipungkhanga)
Solanum xanthocarpum (Solananceae) is traditionally used as pungent, bitter, digestive, diuretic, alternative, astringent and anthelmintic . It was also used in fever, cough, flatulence and heart diseases. Phytochemistry...
Classification of Clustering with Frequent item-sets
Data mining is having techniques like clustering, classification and algorithm like frequent itemset mining algorithms. In this we discuss about clustering and classification techniques with its applications and frequent...