Enhancing Security Clustering Algorithm In The Mobile AD HOC Network
عنوان مقاله: Enhancing Security Clustering Algorithm In The Mobile AD HOC Network
شناسه ملی مقاله: CSITM02_115
منتشر شده در دومین همایش ملی مهندسی رایانه و مدیریت فناوری اطلاعات در سال 1394
شناسه ملی مقاله: CSITM02_115
منتشر شده در دومین همایش ملی مهندسی رایانه و مدیریت فناوری اطلاعات در سال 1394
مشخصات نویسندگان مقاله:
Shahram Khazaei Far - Department of Computer, Islamic Azad University, Science and Research Branch, Tehran
Aliasghar Najafi - Department of Computer, Sayyed Jamaleddin AsadAbadi, University, Hamedan, Tehran
Maryam Sheykholmoloki - Department of Computer, Sayyed Jamaleddin AsadAbadi, University, Hamedan, Tehran
خلاصه مقاله:
Shahram Khazaei Far - Department of Computer, Islamic Azad University, Science and Research Branch, Tehran
Aliasghar Najafi - Department of Computer, Sayyed Jamaleddin AsadAbadi, University, Hamedan, Tehran
Maryam Sheykholmoloki - Department of Computer, Sayyed Jamaleddin AsadAbadi, University, Hamedan, Tehran
It is quite a challenging task to achieve security in a mobile ad hoc network because of its open nature, dynamically changing topology, lack of infrastructure and central management. Aparticular harmful attack that takes the advantage of these characteristics is the Sybil attack, in which a malicious node illegitimately claims multiple identities. This attack can exceedingly disrupt various operations of the mobile ad hoc networks such as data aggregation, voting, fairresource allocation scheme, misbehavior detection and routing mechanisms etc. Two routing mechanisms known to be vulnerable to the Sybil attack in the mobile ad hoc networks are multipath routing and geographic routing. In addition to these routing protocols, we show in thispaper that the Sybil attack can also disrupt the head selection mechanism of the lowest ID cluster-based routing protocol. To the best of our knowledge, this is for the first time that a Sybil attack is shown to disrupt this cluster based routing protocol. To achieve this, we illustrate to haveintroduced a category of Sybil attack in which the malicious node varies its transmission power to create a number of virtual illegitimate nodes called Sybil nodes, for the purpose of communication with legitimate nodes of the Mobile Ad Hoc Network. The variation in the transmission power makes the Sybil attack more deadly and difficult to be detected.
کلمات کلیدی: Mobile Ad Hoc Network, Network Security, Sybil Attack, Malicious node, Sybil Node, Lowest ID Clustering Algorithm
صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/422876/