A cluster based authentication technique for mitigation of internal attacks in manet

ISSN: 1450202X
1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

The wireless nature and inherent features of mobile ad hoc networks make them vulnerable to a wide variety of attacks. In an internal attack, the attacker gains the normal access to the network and takes part in the network activities, either by some malicious impersonation to get the access to the network as a new node, or by directly compromising a current node and using it as a basis to conduct its malicious behaviors. In this paper, we develop a cluster based authentication technique to mitigate the internal attacks. The entire network is divided into hierarchical group of clusters, each cluster having a fully trusted cluster head. Each node holds a certificate issued by an offline certificate authority (CA). The Trust count (TC) for each of the nodes can be estimated periodically for every trust evaluation interval (TEI), based on their access policy (AP). The certificate of a node is renewed or rejected by the cluster head, based on its trust counter value. By simulation results, we show that our proposed technique provides better packet delivery ratio and resilience against node capture. © EuroJournals Publishing, Inc. 2011.

Cite

CITATION STYLE

APA

Murugan, R., & Shanmugam, A. (2011). A cluster based authentication technique for mitigation of internal attacks in manet. European Journal of Scientific Research, 51(3), 433–441.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free