A new secure route discovery protocol for MANETs to prevent hidden channel attacks
A new secure route discovery protocol for MANETs to prevent hidden channel attacks
| dc.contributor.author | Ammayappan, Kavitha | |
| dc.contributor.author | Sastry, Vinjamuri Narsimha | |
| dc.contributor.author | Negi, Atul | |
| dc.date.accessioned | 2022-03-27T05:53:14Z | |
| dc.date.available | 2022-03-27T05:53:14Z | |
| dc.date.issued | 2012-05-01 | |
| dc.description.abstract | In this paper, we propose a new secure route discovery protocol for MANETs that overcomes the vulnerabilities of Ariadne and EndairA, due to hidden channel attacks. It uses 'authentic neighborhood' for route discovery process which potentially protects hidden channels of routing control packets, besides ensuring authenticity and integrity of routing control messages at hop-by-hop level. This authentic neighborhood is augmented by a process of traceability which uses promiscuous mode of a node to detect, diagnose and isolate the adversarial nodes, that disrupt the route discovery process. We observe, from the comparative analysis of the proposed protocol with Ariadne and EndiarA, that the proposed protocol has a balance between security and computational overhead. Security analysis and formal verification, through extended BAN logic and AVISPA toolkit, shows that the proposed protocol is safe against the vulnerabilities identified in Ariadne and EndairA, due to unprotected hidden channels. | |
| dc.identifier.citation | International Journal of Network Security. v.14(3) | |
| dc.identifier.issn | 1816353X | |
| dc.identifier.uri | https://dspace.uohyd.ac.in/handle/1/8609 | |
| dc.subject | Hidden channel attacks | |
| dc.subject | Plausible route | |
| dc.subject | Promiscuous mode | |
| dc.subject | Secure route discovery | |
| dc.subject | Tunnelling attack | |
| dc.title | A new secure route discovery protocol for MANETs to prevent hidden channel attacks | |
| dc.type | Journal. Article | |
| dspace.entity.type |
Files
License bundle
1 - 1 of 1