II. RELATED WORKS
There has been extensive literature related to the security in wireless ad-hoc networks over the last two decades. There are several methods to increase the security other than trust management. Important among them are surveyed here.
Key management is a fundamental problem in securing mobile ad hoc networks (MANETs). In the paper, Securing Mobile Ad Hoc Networks with Certificateless Public Keys [1], Yanchao Zhang et al. presents IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. In IKM the public keys of mobile nodes can be directly derived from their known IDs and some common information, thus it provides a certificateless solution. The need for certificate-based
…show more content…
These records are considered only when they come from a source that has consistently been trustworthy or when they pass the deviation test which evaluates compatibility with one’s own reputation ratings. They modify the reputation rating of a node slightly even after passing the test. The results of the deviation test are additionally used to update the trust rating. It can allow for redemption and prevent capitalizing excessively on past behavior by two mechanisms, namely re-evaluation and fading. This method is coping well with false second-hand reports, as it keeps the number of false positives and false negatives low. The detection of misbehaving nodes accelerates significantly with the use of selected second-hand information. Reputation management cannot completed in peer to peer connection is the disadvantage of this method.
In this paper, Securing Resource-Constrained Wireless Ad Hoc Networks [3], Yuguang Fang et al. a novel approach to addressing security issues and articulate why and how the ID based cryptography can be effectively applied to address various security problems in the resource-constrained wireless networks. This paper demonstrates the advantages of the IDPKC in resource-constrained wireless ad hoc networks and hopes to inspire more research on this approach. Many challenging problems are there. One of the obstacles is the computational
Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. Co
Wireless security in 802.11 is less robust and has many security flaws that can be exploited by an attacker. Security best practice for wireless networks depends on a defense in depth strategy, with five control layers:
Within this article, the authors states that in order to provide a safe and secure wireless network, they outlined the counter attacks and measures for the security of wireless networks. Some of the counter attacks that the authors have listed includes, system security - which breakdowns to administrative level security, physical level security, and technical level security, and information security (Ameen et al, 2012). For the purpose of answering the previous question, the main counter attack that would best defend against the problems would be system security - particularly the administrative level security. At this level of security, administrative control over the system by establishing a well defined user hierarchy plus a strong authentication measures, can prevent security breaches of WLANs from
Solution: Arizona State University uses the authentication technique PEAP (MSCHAP v2). The authenticated technique based on Protected Extensible Authentication Protocol Microsoft Challenge Handshake Authentication Protocol version 2 is much more secure as it uses user credentials i.e. username and password which are stored in Active Directory Domain Services (AD DS) to authenticate all the wireless access clients instead of using user and computer certificates for client authentication. For e.g., if
Wireless networks have grown in popularity. This is largely due to the increase in the value of a network as more users are attached to it. The value added to a network by nature of connecting more devices to it, is summarized in "Metcalf's law." Metcalf's law states that if you "connect any number, n,' of machines - whether computers, phones or even
The last decade of this millennium saw an increment in the usage of wireless devices such as Bluetooth enabled devices that use wireless networks and smartphones with a wireless enabled feature that can allow users to access the internet from anywhere. All that is required is a place where the WLAN is accessible and then get connected using a username and password provided by ISP. WLANs have gained popularity globally as they are being used in places such as universities, airports, places of residence, cafes and so forth. They have numerous benefits such as mobility and flexibility compared to the traditional wired. As the popularity of its usage continues to heighten, it has become important to look at an aspect of security available for WLANS to prevent the network risks associated with this type of network. WEP is a security mechanism for WLANS that this paper will focus on much. The paper will discuss WEP and the weaknesses it has that make it prone to attack.
In [12], Weerasinghe and Fu proposed a solution for prevention cooperative blackhole attacks in MANETs. In their solution, each node maintains a table called Data Routing Information (DRI), which
Most of the current approaches are limited by focusing on enforcing anonymity at a heavy cost to precious resources because public-key-based encryption and high traffic generate significantly high cost Vehicular Ad Hoc Networks (VANETs) and Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. However, existing anonymous routing protocols relying on either hop-by-hop encryption or redundant traffic either generate high cost or cannot provide full anonymity protection to data sources, destinations, and routes[7].
ABE can be implemented in two ways called Key policy Attribute Based Encryption (KP-ABE) and Ciphertext-policy Attribute Based Encryption (CP-ABE). In CP-ABE scheme, the textcipher is encrypted with an access policy chosen by an encryptor like commander, but this key is going to be created with respect to a set of attributes. CP-ABE is more appropriate to decentralized DTNs than KP-ABE because this scheme enables encryptors such as an authorized commander to choose access policies on attributes and to encrypt confidential data under that access structure by encrypting with the corresponding public keys or attributes. Many related studies suggested key revocation mechanisms in CP-ABE and KP-ABE schemes in DTNs, respectively. Those all solutions are to append to each attribute an expiration timestamp and distribute a fresh set of keys to all valid users after the expiration. The timestamp based revocable Attribute Based Encryption schemes suffer from two main problems. The
Abstract— Now a days due to rapid improvements in the wireless and Ad-hoc Network Domain, the development of a special category of wireless ad hoc networks called Mobile Ad-hoc Network (MANET). MANET Communication Security is currently great challenge in presence of different attacks such as DoS, Black Hole attacks, Wormhole Attacks, Sybil Attacks, Timing attacks, etc. In the presence of malicious nodes, preventing or detecting malicious nodes initiation of Gray hole or collaborative black hole attack is a major challenge. This paper introduces a new routing mechanism for MANET communication by using proactive & reactive defense scheme known as Hybrid Defending against Collaborative Black hole Attacks & Gray Hole Attacks. Proposed Scheme is known as CBDS (Co-Operative Bait Detection Scheme) which is based on DSR Based Routing Protocol for Mitigating against Variants of Collaborative Attacks. CBDS is already proposed for MANET but in this paper MANET provides smooth, efficient & secure routing in MANET by using Reverse Tracing Technique. Proposed scheme is more secure and efficient than existing malicious node detection mechanisms..
As discussed, the nodes in MANETs assume every other node to cooperatively transmit the messages; the attackers can easily induce malicious nodes into the network. Hence a secure system has to be implemented to detect the attackers,
This thesis primarily focuses on the safety problems from a network layer perspective. As mentioned in chapter 2, many routing protocols for MANETs exist although none of them address the foremost necessary issue, namely, security. So as to review the attacks and threats, and to plot a protocol that addresses them, an understanding of the operating setting is required. [10]
Wireless networks should be protected to safeguard sensitive information. Several practices can be implemented to protect wireless networks.
when compared with secure foundation of network because of limited energy, the nodes number, storage, Internet bandwidth, communication of sensor nodes and the capabilities of computation. Two main reasons are computation capabilities and low traffic rates. The low traffic rate of sensor nodes can not support battery of sensors to make the network smooth for a long time and devices in the WSN can not support very complex computation to deal with some typical internet attacks. Additionally, Internet attacks can be divided into two types: internal attacks and external attacks. Generally, internal attacks are produced from malicious nodes. On the other hand, when it comes to the external attacks, wireless sensor network are easy to be attacked by several types of external internet attacks, which can be considered to three main aspects: secrecy and authentication attacks, network availability attacks and replay attacks.(p135, denial). Although many traditional techniques that have been used to resist various kinds of attacks, there are still remain serious problems in security of WSN. As a result, it is necessary to come up with the most effective approach to handle the Internet attacks in time because the faster development of technology, the more security problems. For these reasons, the prevention of
In [10], author proposed a scheme which identifies the malicious nodes by using aggregate signature algorithm. It associates three algorithms.