Is really NACK protocol secure to be employed in MANETs?

Saeed, M ; Sharif University of Technology | 2015

671 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/CSE.2014.302
  3. Publisher: Institute of Electrical and Electronics Engineers Inc , 2015
  4. Abstract:
  5. MANET, which stands for Mobile Ad-hoc Network, is composed of a group of self-organized and wireless nodes that do not possess any predictable and fixed infrastructure. When nodes want to communicate with each other, they have to pass on their messages directly or indirectly. In case the destination node is out of the transmission range, the source node has to rely on intermediate nodes, which, in this case, is called indirect transmission. On the other hand, if the destination node is the neighboring node, there is no need to employ intermediate nodes, which, in this case, is called direct transmission. Over the past years, security issues in MANETs have received a great deal of attention due to their extensive applications in, for instance, disaster relief efforts, military battlefields, conference venues, and so on. Because of that, quite a few protocols have been proposed in this realm. In this paper, it is tried to analyze NACK protocol from the security standpoint. NACK was proposed by Sun et al. in 2012. Unfortunately, the proposed scheme not only has some technical problems, it is vulnerable to the man-in-the-middle attack as well, which is a kind of routing misbehavior attack. In the end, some countermeasures are proposed against the mentioned flaw and vulnerability
  6. Keywords:
  7. Man-in themiddle attack ; MANET security ; Vulnerability ; Ad hoc networks ; Disaster prevention ; Military applications ; Mobile security ; Network security ; Telecommunication networks ; Ubiquitous computing ; Wireless ad hoc networks ; Man in the middle attacks ; Military battlefields ; Neighboring nodes ; Routing misbehaviors ; Transmission ranges ; Mobile ad hoc networks
  8. Source: Proceedings - 17th IEEE International Conference on Computational Science and Engineering, CSE 2014, Jointly with 13th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2014, 13th International Symposium on Pervasive Systems, Algorithms, and Networks, I-SPAN 2014 and 8th International Conference on Frontier of Computer Science and Technology, FCST 2014, 19 December 2014 through 21 December 2014 ; 2015 , Pages 1644-1647 ; 9781479979813 (ISBN)
  9. URL: http://ieeexplore.ieee.org/abstract/document/7023813