OTNA: One Time Node Authentication for Secure MANET

نویسندگان

  • Komal Naik joshi
  • Arati M. Dixit
  • P. Singh
  • M. Chandra Pandey
چکیده

Due to infrastructure – less networks and multi hop communication features of Mobile ad hoc network (MANET), every node in MANET has to cooperate with each other. Therefore, node security becomes one of the important research areas of MANET. The resources that provided to MANET nodes such as battery power, memory, and bandwidth are limited. As a result, developing a resource – aware node authentication protocol becomes challenge for researchers. The proposed protocol provides One Time Node Authentication (OTNA) for every node joining MANET. To achieve this, the OTNA protocol provides one additional field 'status' in the routing table of the legitimate nodes, and the Malicious Node Table (MNT). The 'status' field shows authentication status of the nodes present in MANET. The MNT is used to keep record of the malicious nodes detected during node authentication. To perform node authentication, OTNA uses the basics of Challenge Response Protocol (CRP) and one-way hash function with three message exchanges. In the OTNA protocol, only two nodes are involved in authentication process, which allows other available nodes for packet forwarding process. To the best of our knowledge, OTNA protocol facilitates optimal secure packet delivery. The correctness of the OTNA protocol is proved with the help of GNY logic.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Attribute Based Schema for Trust and Cluster Based Authentication Mechanism in MANET

A mobile adhoc network is wireless communication network that have been collection of nodes with no fixed infrastructure and are able to discover the nearby node with lack of centralized control .Due to this lack of security issues occurs, so protecting the data or node in the network is essential in MANET. In recent works distributed system are mostly depend on key distribution and management ...

متن کامل

Secure Transmission in MANET and Wireless Sensor Network

Security is a major issue in any network, having a secure transmission channel for data transmission or a secure communication path from the source to destination is a challenge in MANET and WSN. In MANET, using threshold digital signature is used in existing key management schemes for network. In wireless sensor networks, a security mechanism based on elliptic curve cryptography is considered ...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism

In mobile ad hoc wireless network (MANET), secure communication is more challenging task due to its fundamental characteristics like infrastructure less, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained and physical vulnerability of node. In MANET, attacks can be broadly classified in two categories: routing attacks and data forwarding attacks....

متن کامل

Cluster Based Node Misbehaviour Detection, Isolation and Authentication Using Threshold Cryptography in Mobile Ad Hoc Networks

In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of a network, use of a shared group key for confidentiality and authentication is required. Distributing the shares of secret group key to the group members securely is another challenging task in MANET. In th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014