Cack—a counter based authenticated ack to mitigate misbehaving nodes from manets

被引:0
|
作者
Atheeq C. [1 ]
Rabbani M.M.A. [1 ]
机构
[1] Department of Electrical and Computer Engineering, B S Abdur Rahman Crescent Institute of Science and Technology, Chennai
关键词
Acknowledgment; Ad hoc network; Authentication; Counter; Digital signature; MANET;
D O I
10.2174/2213275912666190809104054
中图分类号
学科分类号
摘要
Background: The evolution of wireless network from wired network presents a world-wide pattern in the previous couple of decades. All the mobile nodes in MANET act as router as well as host at the same time send and receive messages directly to one another until they are in the communication range and use multiple hops if the nodes are outside the communication range. The self-organizing property of nodes in MANET made it prominent among the principal applications like military and or emergency rescue sites. In spite of, the openness and dynamic nature of mobile nodes, MANET suffers from malicious nodes. Studies show that the existing mechanism lacks with cost effective and reduced overhead in the network. Objective: It is vital to design a system that detects the malicious nodes to guard MANET from attackers. With the enhancements of the innovation and cost effective and minimum overhead, our visualization presents a tremendous expansion of MANETs into modern applications. Methods: In this article, we present our proposed model Counter based authenticated acknowledgement uniquely developed for MANETs that uses chebyshev polynomials and digested acknowledgment message for detection of misbehaving nodes in MANET. Results: Implementation shows that the proposed model outperforms in terms of reduced overhead, delay and packet delivery by mitigating attacks. Conclusion: Finally we conclude that we design an effective intrusion detection system that can be adaptable in MANET applications. © 2021 Bentham Science Publishers.
引用
收藏
页码:837 / 847
页数:10
相关论文
共 7 条
  • [1] A Vote Based System to Detect Misbehaving Nodes in MANETs
    Talreja, Rahul
    Jethani, Vimla
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 391 - 394
  • [2] Implementation of Reputation Based Framework for Detecting Misbehaving Nodes and Illustration of Vampire Attack in Manets
    Sheikh, Hasansab
    Geetha, V
    Hariprasad, S. A.
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 861 - 869
  • [3] Preventing malicious packet drops in MANETs by counter based authenticated acknowledgement
    Hussain M.A.
    Duraisamy B.
    Ingenierie des Systemes d'Information, 2020, 25 (02): : 173 - 181
  • [4] Local Monitoring based Reputation System with Alert to Mitigate the Misbehaving Nodes in Mobile Ad Hoc Networks
    Gopalakrishnan, K.
    Uthariaraj, V. Rhymend
    INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 344 - 349
  • [5] Collaborative Polling based Routing Security Scheme to Mitigate the Colluding Misbehaving Nodes in Mobile Ad Hoc Networks
    Gopalakrishnan, K.
    Uthariaraj, V. Rhymend
    WIRELESS PERSONAL COMMUNICATIONS, 2012, 67 (04) : 829 - 857
  • [6] Collaborative Polling based Routing Security Scheme to Mitigate the Colluding Misbehaving Nodes in Mobile Ad Hoc Networks
    K. Gopalakrishnan
    V. Rhymend Uthariaraj
    Wireless Personal Communications, 2012, 67 : 829 - 857
  • [7] An effective mechanism to mitigate packet dropping attack from manets using chaotic map based authentication technique
    Atheeq Ahmed C.
    Altaf C.
    Mohammad M.
    Mohammed A.
    Recent Patents on Engineering, 2024, 18 (03) : 66 - 76