Study of Attacks in MANET, Attacks on AES, Cryptographically Generated Addresses (CGAs) Methods and Possible Alleviation in IPV6 over MANET Area

mobile ad hoc network (MANET) has attracted a lot of attention due to the characteristic of an infrastructure-less construction and multi-hop communication. In MANET, security is major issue, hackers has aimed to disrupt security in the form of IP spoofing or to produce a forged route. In the advancement of networks to IP version 6, appreciating the same protocol would guarantee the achievement and portability of MANETs. Two benefits of approving IPv6 are improved support for security and mobility. To accomplish these goals an innovative mechanism called Cryptographically Generated Addresses (CGAs) were announced. CGAs were primarily comprised in SEcure Neighbor Discovery (SEND) protocol to guard against IP address spoofing and attacks. In this review paper, attacks in MANET, attacks on AES, and various CGA methods are studied. Though, the CGA is hopeful security technique for use with IPV6 addresses it still exhibits vulnerabilities and weaknesses if, used with SHA- I(secure Hash algorithm) algorithm. It is yet prone to privacy related attacks. So, use such method that can be secure and efficient to CGA in IPV6 over MANET area. This paper provides necessary solution to resolve these problems.

[1]  Antonio F. Gómez-Skarmeta,et al.  Security Extensions to MMARP Through Cryptographically Generated Addresses , 2005, GI Jahrestagung.

[2]  Christoph Meinel,et al.  Cryptographically Generated Addresses (CGAs): Possible Attacks and Proposed Mitigation Approaches , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.

[3]  M. U. Siddiqi,et al.  Collision probability of one-to-many reversible mapping for IPv6 address generation , 2012, 2012 International Conference on Computer and Communication Engineering (ICCCE).

[4]  Mohammad Umar Siddiqi,et al.  Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network , 2015, Int. J. Netw. Secur..

[5]  Neeraj Sharma,et al.  ATTACK PREVENTION METHODS FOR DDOS ATTACKS IN MANETS , 2011 .

[6]  Mukesh Zaveri,et al.  Improving AODV Protocol against Blackhole Attacks , 2010 .

[7]  Warren D. Smith 1. AES seems weak. 2. Linear time secure cryptography , 2007, IACR Cryptol. ePrint Arch..

[8]  T. Thumthawatworn,et al.  Adaptive sinkhole detection on wireless ad hoc networks , 2006, 2006 IEEE Aerospace Conference.

[9]  Tuomas Aura,et al.  Cryptographically Generated Addresses (CGA) , 2005, ISC.

[10]  Gabriel Montenegro,et al.  Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.

[11]  P. Goyal,et al.  MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .

[12]  George Kesidis,et al.  Robust Sybil Detection for MANETs , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[13]  Yu Cheng,et al.  Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[14]  S.A. Khan,et al.  Adding Security against Packet Dropping Attack in Mobile Ad Hoc Networks , 2008, 2008 International Seminar on Future Information Technology and Management Engineering.

[15]  Jari Arkko Applying Cryptographically Generated Addresses and Credit-Based Authorization to Mobile IPv6 , 2006 .

[16]  S. Radha,et al.  A Novel Method for Detection and Elimination of Modification Attack and TTL Attack in NTP Based Routing Algorithm , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.

[17]  Girish Katkar,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[18]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[19]  Daniel J. Bernstein,et al.  Cache-timing attacks on AES , 2005 .

[20]  Adolfo Rodriguez,et al.  TCP/IP Tutorial and Technical Overview , 2001 .

[21]  Tarek N. Saadawi,et al.  IEEE 802.11 Denial of Service attack detection in MANET , 2012, Wireless Telecommunications Symposium 2012.

[22]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[23]  Shiyong Zhang,et al.  Resisting flooding attacks in ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[24]  Md. Shamsul Alam,et al.  Security in Ad Hoc Networks: A Location Based Impersonation Detection Method , 2009, 2009 International Conference on Computer Engineering and Technology.

[25]  Eamon Murphy,et al.  Tcp/Ip Tutorial and Technical Overview , 1995 .

[26]  M. U. Siddiqi,et al.  Generation of cryptographic one-to-many mapping IPv6 address using S-AES , 2010, Proceeding of the 3rd International Conference on Information and Communication Technology for the Moslem World (ICT4M) 2010.

[27]  Muthucumaru Maheswaran,et al.  A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[28]  Abhay Kumar Rai,et al.  Different Types of Attacks on Integrated MANET-Internet Communication , 2010 .

[29]  Öznur Özkasap,et al.  Ad-Hoc Networks , 2008, Encyclopedia of Algorithms.

[30]  Jalel Ben-Othman,et al.  Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution , 2009, 2009 IEEE International Conference on Communications.

[31]  P. V. G. D. Prasad Reddy,et al.  Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks , 2011, Netw. Protoc. Algorithms.

[32]  Aseem Jagadev,et al.  Advanced Encryption Standard (AES) Implementation , 2009 .

[33]  Michael Roe,et al.  Child-proof authentication for MIPv6 (CAM) , 2001, CCRV.

[34]  Shaaban Sahmoud,et al.  Enhancement the Security of AES Against Modern Attacks by Using Variable Key Block Cipher , 2013, Int. Arab. J. e Technol..