Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    A cryptographic hashing solution for mitigating persistent packet reordering attack in wireless ad hoc networks
    (2012) Raju, P.R.; Shet, K.C.
    In this paper, we propose a new scheme for mitigating the persistent packet reordering attack. This attack mainly makes use of the end to end congestion control mechanism of TCP. The proposed scheme uses symmetric key cryptography and modified SHA-1 (mSHA-1) hash function for verifying packet reordering. This is implemented with AOMDV routing protocol using NS-2 network simulator. The proposed solution blocks the attack after its detection. The efficiency of the proposed scheme is evaluated on different performance metrics like congestion window and TCP Good put as the attack mainly targets the congestion control mechanism of TCP. © 2012 IEEE.
  • Item
    A simple and efficient mechanism to detect and avoid wormhole attacks in mobile ad hoc networks
    (2012) Raju, V.K.; Kumar, K.V.
    Mobile ad hoc networks are vulnerable to many kinds of attacks since they have unique characteristics like limited bandwidth, limited battery power and dynamic network topology. Among the various attacks possible in mobile ad hoc networks wormhole attack is one which is treated as a very severe attack. In this attack a malicious node records packets at one location in the network and tunnels them to another malicious node which is present in the other end of the network. In this paper, we have proposed an algorithm which detects and avoids the wormhole attack in the routing phase itself. Our mechanism is based on the total round trip time (RTT) of the established route and the average round trip times of the sender one hop neighbors, which is considered as maximum one hop round trip time. Our solution works for both mobile ad hoc networks and wireless ad hoc networks. © 2012 IEEE.