Đang chuẩn bị liên kết để tải về tài liệu:
A novel algorithm based on trust authentication mechanisms to detect and prevent malicious nodes in mobile ad hoc network

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

The simulation results in NS2 show that TAM can successfully detect and prevent to 100% malicious nodes using fake keys and above 99% (the mistaken rate below 1.0%) wormhole nodes under hide mode for all mobility scenarios where there are nodes move with 30m/s maximum speeds and variable tunnel lengths. | Journal of Computer Science and Cybernetics, V.33, N.4 (2017), 357–378 DOI 10.15625/1813-9663/33/4/10759 A NOVEL ALGORITHM BASED ON TRUST AUTHENTICATION MECHANISMS TO DETECT AND PREVENT MALICIOUS NODES IN MOBILE AD HOC NETWORK LUONG THAI NGOC1,2 , VO THANH TU1 1 Faculty 2 Faculty of Information Technology, Hue University of Sciences, Hue University of Mathematics and Informatics Teacher Education, Dong Thap University 1,2 ltngoc@dthu.edu.vn Abstract. Ad hoc On-demand Distance Vector (AODV) is a reactive routing protocols used popularly in Mobile Ad hoc Network. AODV is target of many Denial of Service (DoS) attack types, such as Blackhole/ Sinkhole, Grayhole, Flooding and Whirlwind. There are some published researches to improvement AODV for security goal using digital signature, for example, SAODV and ARAN. However, they have some weakness that a malicious node can attack SAODV by using fake keys and both of SAODV and ARAN routing protocols can not detect wormhole nodes under hide mode. This article proposes a Trust Authentication Mechanisms (TAM) which uses public-key cryptography RSA and digital certificates (DC) based on X509 standard. TAM allows an intermediate node authenticates a preceding nodes by checking all control route packets through 3 steps: (1) Digital certificates; (2) actual neighbors; and (3) packet integrity authentications. The simulation results in NS2 show that TAM can successfully detect and prevent to 100% malicious nodes using fake keys and above 99% (the mistaken rate below 1.0%) wormhole nodes under hide mode for all mobility scenarios where there are nodes move with 30m/s maximum speeds and variable tunnel lengths. Keywords. AODV; MANET; TAM; TAMAN; network security; trust authentication mechanisms. 1. INTRODUCTION Mobile Ad hoc Network (MANET [5]) is a wireless network connecting mobile devices. In MANET, nodes are able to move freely to any direction and cooperate to forward packets to each other to reach destination beyond .