Detection of Mobile Replica Node Attacks in Mobile Computing Environment using GUIDE Technique
- DOI
- 10.2991/pecteam-18.2018.9How to use a DOI?
- Keywords
- Replica node reduction, Mobile Node, Pseudo random number, GUIDE (Greedy User IDEntification) technique
- Abstract
Mobile computing is a term used to refer to a variety of devices that allow accessing data and information from anytime, anyplace, anywhere. The mobile networks are often deployed in complex environments in which to provide a secure transmission and also to detect the hackers. An adversary can capture and compromise mobile nodes, generate replicas of those nodes, and mount a variety of attacks with the replicas injects into the network. These attacks are dangerous because they allow the attacker to leverage and compromise of a few nodes to exert control over much of the network. Thus adversaries can capture some nodes, replicate them and deploy those replicas back into the strategic positions in the network to launch a variety of attacks. These are referred to as node replication attacks. Some methods of defending against node replication attacks have been proposed only in static networks. This paper proposes the work for mobile networks for detecting replica node attack. In this scenario, one of the dangerous attack is the replica attack, in which the adversary takes the secret keying materials from a compromised node, generates a large number of attacker-controlled replicas that share the node's keying materials and ID, and then spreads these replicas throughout the network. To prevent and avoid such replica nodes, each and every node has its own spread value generated by pseudo random number which is registered in base station including IP address along with their secret keying materials. Whenever mobile node sends packet through base station by transmission channel, at the time detection and verification of nodes were performed by applying GUIDE technique. Then the base station allows broadcasting the packets and reaching destination IP address. Thereby we can avoid the replica node attacks and also provide information of intruders in efficient manner to achieve effective and robust replica detection capability with reasonable overheads.
- Copyright
- © 2018, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - M Subathira Devi AU - G Sakthigopalan AU - S Santhoshkumar AU - D Karunkuzhali PY - 2018/02 DA - 2018/02 TI - Detection of Mobile Replica Node Attacks in Mobile Computing Environment using GUIDE Technique BT - Proceedings of the International Conference for Phoenixes on Emerging Current Trends in Engineering and Management (PECTEAM 2018) PB - Atlantis Press SP - 47 EP - 50 SN - 2352-5401 UR - https://doi.org/10.2991/pecteam-18.2018.9 DO - 10.2991/pecteam-18.2018.9 ID - SubathiraDevi2018/02 ER -