CFP last date
20 May 2024
Reseach Article

Modification in the Kerberos Assisted Authentication in Mobile Ad-hoc Networks to Prevent Black Hole Attack

by Manpreet Kaur, Tanu Preet Singh, Barjinder Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 23
Year of Publication: 2015
Authors: Manpreet Kaur, Tanu Preet Singh, Barjinder Singh
10.5120/20694-3585

Manpreet Kaur, Tanu Preet Singh, Barjinder Singh . Modification in the Kerberos Assisted Authentication in Mobile Ad-hoc Networks to Prevent Black Hole Attack. International Journal of Computer Applications. 117, 23 ( May 2015), 23-27. DOI=10.5120/20694-3585

@article{ 10.5120/20694-3585,
author = { Manpreet Kaur, Tanu Preet Singh, Barjinder Singh },
title = { Modification in the Kerberos Assisted Authentication in Mobile Ad-hoc Networks to Prevent Black Hole Attack },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 23 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number23/20694-3585/ },
doi = { 10.5120/20694-3585 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:00:11.890998+05:30
%A Manpreet Kaur
%A Tanu Preet Singh
%A Barjinder Singh
%T Modification in the Kerberos Assisted Authentication in Mobile Ad-hoc Networks to Prevent Black Hole Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 23
%P 23-27
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANET is the self-configuring type of network in which the mobile nodes can leave or join the network when they want. MANET is decentralized type of network, no central controller is present. Due to their unique features mobile ad hoc networks can be deployed anywhere round the clock. This posed the remedial venture to large number of attacks like replay attack, fabrication, eavesdropping etc Kaman provides secure solution to the problem of secure channel establishment, secure exchange of session keys and prevention of nodes identity forgery. In this paper, we reviewed the Kaman; Kerberos assisted Authentication in Mobile Ad hoc Network and added the concept of timers in KAMAN to solve the problem of black hole attack that aroused when Kaman protocol is embedded into large network AODV, on-demand routing protocol had been used to select secure shortest path between the nodes.

References
  1. Asad Amir Pirzada and Chris McDonald,"Kerberos Assisted Authentication in Mobile Ad-hoc Networks
  2. Kashif Bashir and Mohammad Khalid Khan,"Modification in Kerberos Assisted Authentication in Mobile Ad-Hoc Networks to Prevent Ticket Replay Attacks", IEEE 2012.
  3. Semih Dokurer and Y. M. Erten and Can Erkin Acar,"Performance analysis of ad-hoc networks under black hole attacks", IEEE 2007.
  4. Satyajayant Misra, Kabi Bhattarai and and Guoliang Xue,"BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks",IEEE 2011.
  5. Shashidhar M S and Suresha D," Implementation of Secure Biometric Authentication Using Kerberos Protocol", 2013.
  6. Monika, Mukesh Kumar and Rahul Rishi,"Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review", IEEE 2010.
  7. Trapti Ozha," Kerberos: An Authentication Protocol ", IEEE 2013.
  8. Ramana Rao Kompella, Jennifer Yates, Albert Greenberg, and Alex C. Snoeren,"Detection and Localization of Network Black Holes", IEEE 2007.
  9. Andreas Hafslund and Jon Andersson, Thales Norway AS (2006),"2-Level Authentication Mechanism in an Internet connected MANET", 6th Scandinavian Workshop on Wireless Ad-hoc Networks.
  10. Adebanjo Adekiigbe, ,Kamalrulnizam Abu Bakar And Ogunnusi Olumide Simeon (2011), "A Review of Cluster-Based Congestion Control Protocols in Wireless Mesh Networks",1 IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 2, July 2011 ISSN (Online): 1694-0814.
  11. C. E. Perkins, P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers", SIG- COMM?94 Conference on Communications Architectures, Protocols and Applications, August 2008, pp. 234–244.
  12. C. Siva Ram Murthy, B. S. Manoj, 2007 "Ad Hoc Wireless Networks, Architectures and Protocols"
  13. Ching-Wen Chen, Ming-Chin Chuang, "An Efficient Authentication Scheme between MANET and WLAN Based on Mobile IPv6", International Journal of Network Security, Vol. 1, No. 1, PP . 14–23, July 2005 (http://isrc. nchu. edu. tw/ijns/).
  14. D. Liu, P. Ning, (2008) "Establishing pairwise keys in distributed sensor networks", ACM Conference on Computer and Communications Security (CCS), October 2008.
  15. D. Liu, P. Ning, (2004) "Multi-Level u-TESLA: a broadcast authentication system for distributed sensor networks", ACM Transactions in Embedded Computing Systems (TECS),vol. 3 (4), 2004, pp. 800–836.
  16. David B. Johnson David A. Maltz Josh Broch," DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks.
  17. Georgios Kambourakis, Elisavet Konstantinou," Efficient Certification Path Discovery for MANET".
  18. Georgy Sklyarenko, (2009) "AODV Routing Protocol" . Institute Info rmatik ,Freie University at Berlin, European Journal of Scientific research.
  19. Govind Sharma, Manish Gupta (2012)," Black Hole Detection in MANET Using AODVRouting Protocol",
  20. International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-1, Issue-6, January 2012.
  21. Irshad Ullah,Shoaib UR Rehman,2010 "Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols"
  22. Kimaya Sanzgiri Bridget Dahill Brian Neil Levine Clay Shields Elizabeth M. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks", Dept. of Computer Science, University of California, Santa Barbara, CA 93106.
  23. Kamarularifin Abd. Jalil , Zaid Ahmad , Jamalul-Lail Ab Manan, "Mitigation of Black Hole Attacks for AODV Routing Protocol", Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Malaysia, Shah Alam, Selangor, Malaysia.
  24. Kashif Bashir and Mohammad Khalid Khan,(2012), "Modification in Kerberos Assisted Authentication in Mobile Ad-Hoc Networks to Prevent Ticket Replay Attacks", IACSIT International Journal of Engineering and Technology, Vol. 4, No. 3, June
Index Terms

Computer Science
Information Sciences

Keywords

Black hole Mutual Authentication Secure server MANET KAMAN.