Performance Analysis of Malicious Node Aware Routing for MANET using Two-Hop Authentication

The inherent features of the MANET [1] make it vulnerable to a wide range of attacks. There is no guarantee that a communication path is free from malicious and compromised nodes which deliberately wish to disrupt the network communication. In this paper, we present a security mechanism that provides message integrity, mutual authentication and twohop authentication mechanism without the assistance of online certification authority. Our mechanism not only prevents identity impersonation, replay attacks, but also enables node to regulate the behavior of its neighbors to foil active attacks. The effectiveness of the proposed scheme is analyzed to DSR and OLSR routing using simulator NS2.34

[1]  C. Adjih,et al.  Attacks Against OLSR : Distributed Key Management for Security , 2022 .

[2]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[3]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[4]  Gene Tsudik,et al.  SRDP: securing route discovery in DSR , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[5]  Pietro Michiardi,et al.  Cooperation enforcement and network security mechanisms for mobile ad hoc networks , 2004 .

[6]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[7]  李幼升,et al.  Ph , 1989 .

[8]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[9]  Nei Kato,et al.  Analysis of the node isolation attack against OLSR-based mobile ad hoc networks , 2006, 2006 International Symposium on Computer Networks.

[10]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[11]  Pietro Michiardi,et al.  Preventing denial of service and selfishness in ad hoc networks , 2002 .

[12]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[13]  C. Siva Ram Murthy,et al.  Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .

[14]  Audun Jøsang,et al.  The right type of trust for distributed systems , 1996, NSPW '96.