一种防止虫洞攻击的密码技术的实现

K. Sundaravadivel
{"title":"一种防止虫洞攻击的密码技术的实现","authors":"K. Sundaravadivel","doi":"10.21917/ijct.2019.0283","DOIUrl":null,"url":null,"abstract":"Mobile Ad-hoc network (MANET) is a decentralized type of wireless network. Due to its low cost of installation and easy maintenance, it is always self-configuring, infrastructure-less network of mobile devices associated with wirelessly. Every device in a MANET is free to move separately in any direction, and will therefore change its associations with the other devices regularly. Mobile ad-hoc network is similar kind of network where the device working as both sender and receiver. In this network, the device to device communication is usually has a routable networking environment on top of a Link Layer. Therefore, an intermediate host always becomes a part of communication. If the intermediate host is not trusted, then it can be modifying the messages transmitted to towards the destination host. A mechanism is necessary to improve the present communication technique in mobile ad-hoc network. So, we have used the cryptography technique. Then, the security in ad-hoc networks is investigate. The investigation leads to find a solution for wormhole attack. In this attacker, a group of attacker is deployed in the network and troubles the privacy and security of the network. Therefore, a solution with the cryptographic technique to prevent the information forward to the destination is proposed. The second contribution of the work is to prepare a technique by which the wormhole nodes are prevented in the network. The implementation of the proposed work is performed on the NS2 network simulator and the generated trace files are used for performance evaluation of the work. The performance of the proposed routing protocol evaluates the in conditions of end to end delay, throughput, packet delivery ratio, and packet drop ratio and also validate the solution for the proposed routing protocols performance is compared with the established EAACK and the AODV routing protocol. According to the experimental results, the performance of the proposed routing protocol is found optimum and adaptable for both security and performance issues in the network.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"IMPLEMENTATION OF A CRYPTOGRAPHY TECHNIQUE TO PREVENT WORMHOLE ATTACK\",\"authors\":\"K. Sundaravadivel\",\"doi\":\"10.21917/ijct.2019.0283\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile Ad-hoc network (MANET) is a decentralized type of wireless network. Due to its low cost of installation and easy maintenance, it is always self-configuring, infrastructure-less network of mobile devices associated with wirelessly. Every device in a MANET is free to move separately in any direction, and will therefore change its associations with the other devices regularly. Mobile ad-hoc network is similar kind of network where the device working as both sender and receiver. In this network, the device to device communication is usually has a routable networking environment on top of a Link Layer. Therefore, an intermediate host always becomes a part of communication. If the intermediate host is not trusted, then it can be modifying the messages transmitted to towards the destination host. A mechanism is necessary to improve the present communication technique in mobile ad-hoc network. So, we have used the cryptography technique. Then, the security in ad-hoc networks is investigate. The investigation leads to find a solution for wormhole attack. In this attacker, a group of attacker is deployed in the network and troubles the privacy and security of the network. Therefore, a solution with the cryptographic technique to prevent the information forward to the destination is proposed. The second contribution of the work is to prepare a technique by which the wormhole nodes are prevented in the network. The implementation of the proposed work is performed on the NS2 network simulator and the generated trace files are used for performance evaluation of the work. The performance of the proposed routing protocol evaluates the in conditions of end to end delay, throughput, packet delivery ratio, and packet drop ratio and also validate the solution for the proposed routing protocols performance is compared with the established EAACK and the AODV routing protocol. According to the experimental results, the performance of the proposed routing protocol is found optimum and adaptable for both security and performance issues in the network.\",\"PeriodicalId\":30618,\"journal\":{\"name\":\"ICTACT Journal on Communication Technology\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ICTACT Journal on Communication Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21917/ijct.2019.0283\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ICTACT Journal on Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21917/ijct.2019.0283","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

移动自组织网络(MANET)是一种去中心化的无线网络。由于其安装成本低且易于维护,它始终是自配置的、无基础设施的无线移动设备网络。MANET中的每个设备都可以自由地在任何方向上单独移动,因此会定期改变其和其他设备的关联。移动自组织网络是一种类似的网络,其中设备既是发送者又是接收者。在这种网络中,设备到设备的通信通常在链路层之上具有可路由的网络环境。因此,中间主机总是成为通信的一部分。如果中间主机不受信任,则它可以修改向目标主机传输的消息。需要一种机制来改进移动自组织网络中的现有通信技术。因此,我们使用了密码学技术。然后,对ad-hoc网络的安全性进行了研究。这项调查为虫洞攻击找到了解决方案。在这种攻击者中,一组攻击者部署在网络中,扰乱了网络的隐私和安全。因此,提出了一种利用加密技术防止信息转发到目的地的解决方案。这项工作的第二个贡献是准备了一种技术,通过该技术可以防止网络中的虫洞节点。所提出的工作在NS2网络模拟器上执行,生成的跟踪文件用于工作的性能评估。所提出的路由协议的性能评估了端到端延迟、吞吐量、数据包传递率和数据包丢弃率的条件,并验证了所提出路由协议的解决方案。将所提出的协议性能与已建立的EAACK和AODV路由协议进行了比较。根据实验结果,所提出的路由协议的性能是最优的,并且可以适应网络中的安全和性能问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
IMPLEMENTATION OF A CRYPTOGRAPHY TECHNIQUE TO PREVENT WORMHOLE ATTACK
Mobile Ad-hoc network (MANET) is a decentralized type of wireless network. Due to its low cost of installation and easy maintenance, it is always self-configuring, infrastructure-less network of mobile devices associated with wirelessly. Every device in a MANET is free to move separately in any direction, and will therefore change its associations with the other devices regularly. Mobile ad-hoc network is similar kind of network where the device working as both sender and receiver. In this network, the device to device communication is usually has a routable networking environment on top of a Link Layer. Therefore, an intermediate host always becomes a part of communication. If the intermediate host is not trusted, then it can be modifying the messages transmitted to towards the destination host. A mechanism is necessary to improve the present communication technique in mobile ad-hoc network. So, we have used the cryptography technique. Then, the security in ad-hoc networks is investigate. The investigation leads to find a solution for wormhole attack. In this attacker, a group of attacker is deployed in the network and troubles the privacy and security of the network. Therefore, a solution with the cryptographic technique to prevent the information forward to the destination is proposed. The second contribution of the work is to prepare a technique by which the wormhole nodes are prevented in the network. The implementation of the proposed work is performed on the NS2 network simulator and the generated trace files are used for performance evaluation of the work. The performance of the proposed routing protocol evaluates the in conditions of end to end delay, throughput, packet delivery ratio, and packet drop ratio and also validate the solution for the proposed routing protocols performance is compared with the established EAACK and the AODV routing protocol. According to the experimental results, the performance of the proposed routing protocol is found optimum and adaptable for both security and performance issues in the network.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
审稿时长
8 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信