Secure Routing Protocols for Wireless Adhoc Networks

Secure Routing Protocols for Wireless Adhoc Networks

Kannan Balasubramanian (Mepco Schlenk Engineering College, India) and S. Amutha (P.S.R. Engineering College, India)
Copyright: © 2015 |Pages: 10
DOI: 10.4018/978-1-4666-5888-2.ch140
OnDemand PDF Download:
$30.00
List Price: $37.50

Chapter Preview

Top

Attacks And Countermeasures In Manet

Table 1 summarises the attacks, issues and countermeasures in each layer of the network protocol suite. The main attacks are Modification attacks, Impersonation attacks, Fabrication attacks and Lack of Cooperation attacks. The countermeasures include both preventive and reactive mechanisms. Preventive mechanisms include authentication, access control, encryption and digital signatures. Reactive mechanisms include use of Intrusion Detection System(IDS) and cooperation enforcement to detect misuse and anomalies.

Key Terms in this Chapter

Message Authentication Code: A checksum computed over the message to verify the integrity of the message after transmission.

Certificates: Distribution of public keys of users by an authority.

Diffie-Hellman Key Exchange: A key exchange protocol for establishing secret key.

Hash Chains: Multiple applications of hashing algorithms over the message.

Symmetric cryptography: Also called private key encryption algorithm since only a secret key is required between the sender and the receiver of a message.

Mobile Adhoc Networks: Networks formed in an adhoc fashion. Vehicular adhoc networks, Networks of handheld devices etc.

Routing Protocols: Control messages exchanged between network nodes to find routing paths.

Digital Signatures: Encrypted hash of a message. Provides protection against non-repudiation.

Asymmetric cryptography: Requires a pair of keys at the sender and at the receiver.

Security: Protecting the messages exchanged in the network against tampering and eavesdropping.

Complete Chapter List

Search this Book:
Reset