Academic Journals Database
Disseminating quality controlled scientific knowledge

An efficient unobservable routing scheme resistant against DoS attacks

ADD TO MY LIST
 
Author(s): Chithra K,Dr.S.Karthik

Journal: International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
ISSN 2278-1323

Volume: 1;
Issue: 10;
Start page: 007;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Routing protocols | malicious detection | Security.

ABSTRACT
Privacy protection for ad hoc networkswith low-power wireless devices and lowbandwidthnetwork connection is a verychallenging task. A number of anonymous routingschemes have been proposed for ad hoc networksto provide better support for privacy protection butbring significant computation overhead. Theexisting system introduces efficient privacypreservingrouting protocol USOR that achievescontent unobservability by employing anonymouskey establishment based on group signature inwhich each node obtain a group signature signingkey and an ID-based private key from an offlinekey server or by a key management scheme. Theunobservable routing protocol is then executed intwo phases such as anonymous key establishmentprocess and unobservable route discovery processin order to construct secret session keys as well asfinding route to the destination. The USOR schemeis protect packet’s content independent of trafficpattern unobservability which can be used withappropriate traffic padding schemes to achievetruly communication unobservability. Although itperforms well wormhole attacks cannot beprevented in USOR mechanism. The proposedsystem aimed at developing unobservable routingscheme resistant against DoS attacks such as Grayhole/Black hole attacks to protect network-layerreactive protocols. It discovers malicious nodesduring route discovery process when they mitigatefabricated routing information to attract the sourcenode to send data through malformed packet.Security analysis demonstrates that USOR can wellprotect userprivacy against internal and externalattackersand simulation results show that itachieves stronger privacy protection than existingschemes.
Why do you need a reservation system?      Save time & money - Smart Internet Solutions