CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Proposing Trust Count based Validation Method to Lessen Internal Attacks in Mobile Networks

Published on May 2015 by Mohd. Shajid Ansari, Sital Chandra Naik, Divyanshu Jaiswal, Bhupendra Thakur
National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering
Foundation of Computer Science USA
ACEWRM2015 - Number 1
May 2015
Authors: Mohd. Shajid Ansari, Sital Chandra Naik, Divyanshu Jaiswal, Bhupendra Thakur
e9897927-06d1-41e5-a63f-68a681be6c26

Mohd. Shajid Ansari, Sital Chandra Naik, Divyanshu Jaiswal, Bhupendra Thakur . Proposing Trust Count based Validation Method to Lessen Internal Attacks in Mobile Networks. National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering. ACEWRM2015, 1 (May 2015), 33-37.

@article{
author = { Mohd. Shajid Ansari, Sital Chandra Naik, Divyanshu Jaiswal, Bhupendra Thakur },
title = { Proposing Trust Count based Validation Method to Lessen Internal Attacks in Mobile Networks },
journal = { National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering },
issue_date = { May 2015 },
volume = { ACEWRM2015 },
number = { 1 },
month = { May },
year = { 2015 },
issn = 0975-8887,
pages = { 33-37 },
numpages = 5,
url = { /proceedings/acewrm2015/number1/20899-6024/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering
%A Mohd. Shajid Ansari
%A Sital Chandra Naik
%A Divyanshu Jaiswal
%A Bhupendra Thakur
%T Proposing Trust Count based Validation Method to Lessen Internal Attacks in Mobile Networks
%J National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering
%@ 0975-8887
%V ACEWRM2015
%N 1
%P 33-37
%D 2015
%I International Journal of Computer Applications
Abstract

Security is an essential service for wired and wireless network communications. The success of mobile networks strongly depends on people's confidence in its security. However, the characteristics of MNET pose both challenges and opportunities in achieving security goals, such as confidentiality, authentication, integrity, availability, access control, and non-repudiation. The wireless nature and inherent features of mobile networks make them exposed to a wide variety of attacks. In an internal attack, the attacker gains the normal access to the network and takes part in the network activities, either by some malicious imitation to get the access to the network as a new node, or by directly compromising a current node and using it as a basis to conduct its malicious behaviors. In this paper, we develop a cluster based validation methods to lessen internal attacks. The entire network is divided into hierarchical group of clusters, each cluster having a fully trusted cluster head. Each node holds a certificate issued by an offline certificate authority (CA). The Trust Count (TC) for each of the nodes can be estimated periodically for every trust evaluation interval (TEI), based on their access policy (AP). The certificate of a node is renewed or rejected by the cluster head, based on its trust counter value. By simulation results, we show that our proposed technique provides better packet delivery ratio and resilience against node capture.

References
  1. Mark E. Orwat, Timothy E. Levin, and Cynthia E. Irvine, ?An Ontological Approach to Secure MNET Management?, In Proceedings of the 2008 Third International Conference on Availability, Reliability and Security, pp. 787-794 , 2008.
  2. Mohd Izuan Mohd Saad and Zuriati Ahmad Zukarnain, ?Performance Analysis of Random-Based Mobility Models in MNET Routing Protocol?, European Journal of Scientific Research, . 32(4), pp. 444-454, 2009.
  3. M. Uma and Dr. G. Padmavathi, ?A Comparative Study And Performance Evaluation Of Reactive Quality Of Service Routing Protocols In Mobile Networks?, Journal of Theoretical and Applied Information Technology, 6(2), pp. 223-239, 2009.
  4. Bing Wu, Jianmin Chen, Jie Wu and Mihaela Cardei, ?A Survey on Attacks and Countermeasures in Mobile Networks?, Wireless/Mobile Network Security, Y. Xiao, X. Shen, and D. -Z. Du (Eds. ), Springer, 2006.
  5. Yu Huang, Beihong Jin, Jiannong Cao, Guangzhong Sun and Yulin Feng, ?A Selective Push Algorithm for Cooperative Cache Consistency Maintenance over MNETs?, EUC, pp. 650-660, 2007.
  6. N. Shanthi, L. Ganeshen and K. Ramar,? Study Of Different Attacks On Multicast Mobile Network?, Journal of Theoretical and Applied Information Technology, 9(2), pp. 45-51, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Node Capture Attacks Clustering Trust Count Access Policy