Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node
نویسندگان
چکیده
Nodes in a mobile computing system are vulnerable to clone attacks due their mobility. In such attacks, an adversary accesses few network nodes, generates replication, then inserts this replication into the network, potentially resulting numerous internal attacks. Most existing techniques use central base station, which introduces several difficulties network's reliance on single point, while other ways generate more overhead jeopardising lifetime. research, intelligent double hashing-based node identification scheme was used, reduces communication and memory costs performing detection procedure. The approach works two stages: first, is deployed using hashing procedure avoid any collisions second, searches for network. This first phase verifies prior deployment, then, whenever wants interact, it executes second level of authentication. End-to-end delay, bound increase owing injection packet loss, reduced by technique, were used evaluate performance aforementioned approach.
منابع مشابه
Mobile Node Authentication Protocol for Proxy Mobile
We are now going to the 4G network and in the 4G network environment, there are so many devices connected to the Internet while they move. We have protocol that can support movement of communicating node without any disruption of their connection status named Mobile IP(MIP). But, the major problem of this MIP is too heaviness of the protocol for small mobile nodes. So, IETF now propose PMIP to ...
متن کاملUntraceable Mobile Node Authentication in WSN
Mobility of sensor node in Wireless Sensor Networks (WSN) brings security issues such as re-authentication and tracing the node movement. However, current security researches on WSN are insufficient to support such environments since their designs only considered the static environments. In this paper, we propose the efficient node authentication and key exchange protocol that reduces the overh...
متن کاملEnhancement of Node Authentication and Security in Mobile ADHOC Network
The wireless networks play major rule in networking field. Routing and mobility are the major problems in mobile ADHOC networks. These problems can be avoided using clustering based authentication of approaches. In these paper describes The implementations of secured node verification scheme that authenticates the true nodes to access network and detects attacker nodes and Q–LEACH based cluster...
متن کاملMultifold node authentication in mobile ad hoc networks
An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer-to-peer network model. In this article we propose a multifold node authentication approach for protecting mobile ad hoc networks. The security requirements for protecting data ...
متن کاملClone Attack Detection in MWSN Using Neighbor Node Information
Various types of attacks occurred in WSN network. Attack occur in WSN is clone attack which is also known as replica attack. In this attack the node copy the id of the other node and show its predictions at different locations. A clone node can create a black hole or wormhole attack include adversary can use them in different ways. This attack can transmit false information to all legitimate no...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, materials & continua
سال: 2022
ISSN: ['1546-2218', '1546-2226']
DOI: https://doi.org/10.32604/cmc.2022.020920