Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node

نویسندگان

چکیده

Nodes in a mobile computing system are vulnerable to clone attacks due their mobility. In such attacks, an adversary accesses few network nodes, generates replication, then inserts this replication into the network, potentially resulting numerous internal attacks. Most existing techniques use central base station, which introduces several difficulties network's reliance on single point, while other ways generate more overhead jeopardising lifetime. research, intelligent double hashing-based node identification scheme was used, reduces communication and memory costs performing detection procedure. The approach works two stages: first, is deployed using hashing procedure avoid any collisions second, searches for network. This first phase verifies prior deployment, then, whenever wants interact, it executes second level of authentication. End-to-end delay, bound increase owing injection packet loss, reduced by technique, were used evaluate performance aforementioned approach.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobile Node Authentication Protocol for Proxy Mobile

We are now going to the 4G network and in the 4G network environment, there are so many devices connected to the Internet while they move. We have protocol that can support movement of communicating node without any disruption of their connection status named Mobile IP(MIP). But, the major problem of this MIP is too heaviness of the protocol for small mobile nodes. So, IETF now propose PMIP to ...

متن کامل

Untraceable Mobile Node Authentication in WSN

Mobility of sensor node in Wireless Sensor Networks (WSN) brings security issues such as re-authentication and tracing the node movement. However, current security researches on WSN are insufficient to support such environments since their designs only considered the static environments. In this paper, we propose the efficient node authentication and key exchange protocol that reduces the overh...

متن کامل

Enhancement of Node Authentication and Security in Mobile ADHOC Network

The wireless networks play major rule in networking field. Routing and mobility are the major problems in mobile ADHOC networks. These problems can be avoided using clustering based authentication of approaches. In these paper describes The implementations of secured node verification scheme that authenticates the true nodes to access network and detects attacker nodes and Q–LEACH based cluster...

متن کامل

Multifold node authentication in mobile ad hoc networks

An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer-to-peer network model. In this article we propose a multifold node authentication approach for protecting mobile ad hoc networks. The security requirements for protecting data ...

متن کامل

Clone Attack Detection in MWSN Using Neighbor Node Information

Various types of attacks occurred in WSN network. Attack occur in WSN is clone attack which is also known as replica attack. In this attack the node copy the id of the other node and show its predictions at different locations. A clone node can create a black hole or wormhole attack include adversary can use them in different ways. This attack can transmit false information to all legitimate no...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2022

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2022.020920