2018
DOI: 10.15625/1813-9663/33/4/10759
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Algorithm Based on Trust Authentication Mechanisms to Detect and Prevent Malicious Nodes in Mobile Ad Hoc Network

Abstract: Abstract. Ad hoc On-demand Distance Vector (AODV) is a reactive routing protocols used popularly in Mobile Ad hoc Network. AODV is target of many Denial of Service (DoS) attack types, such as Blackhole/ Sinkhole, Grayhole, Flooding and Whirlwind. There are some published researches to improvement AODV for security goal using digital signature, for example, SAODV and ARAN. However, they have some weakness that a malicious node can attack SAODV by using fake keys and both of SAODV and ARAN routing protocols can … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…Another approach to increase security level for routing protocols is based on digital signature, typically SAODV [17], ARAN [29] and TAMAN [21]. The weakness of SAODV is that it only supports end-to-end authentication, does not support the preceding node authenticate mechanism, so the intermediate node can not check its predecessor.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Another approach to increase security level for routing protocols is based on digital signature, typically SAODV [17], ARAN [29] and TAMAN [21]. The weakness of SAODV is that it only supports end-to-end authentication, does not support the preceding node authenticate mechanism, so the intermediate node can not check its predecessor.…”
Section: Related Workmentioning
confidence: 99%
“…[10,18]. TAMAN [21] is improved from AODV that it uses a trust authentication mechanisms named TAM based on the public key cryptography RSA [2] and hash function SHA 1 [12]. In the route discovery phase, all mobile nodes check its preceding nodes by using digital certificates, actual neighbors and packet integrity authenticate mechanism.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations