Mobile computing is a term used to refer to a variety of devices that allow accessing data and information from anytime, anyplace, anywhere. The mobile networks are often deployed in complex environments in which to provide a secure transmission and also to detect the hackers. An adversary can capture and compromise mobile nodes, generate replicas of those nodes, and mount a variety of attacks with the replicas injects into the network. These attacks are dangerous because they allow the attacker to leverage and compromise of a few nodes to exert control over much of the network. Thus adversaries can capture some nodes, replicate them and deploy those replicas back into the strategic positions in the network to launch a variety of attacks. These are referred to as node replication attacks. Some methods of defending against node replication attacks have been proposed only in static networks. This paper proposes the work for mobile networks for detecting replica node attack. In this scenario, one of the dangerous attack is the replica attack, in which the adversary takes the secret keying materials from a compromised node, generates a large number of attackercontrolled replicas that share the node's keying materials and ID, and then spreads these replicas throughout the network. To prevent and avoid such replica nodes, each and every node has its own spread value generated by pseudo random number which is registered in base station including IP address along with their secret keying materials. Whenever mobile node sends packet through base station by transmission channel, at the time detection and verification of nodes were performed by applying GUIDE technique. Then the base station allows broadcasting the packets and reaching destination IP address. Thereby we can avoid the replica node attacks and also provide information of intruders in efficient manner to achieve effective and robust replica detection capability with reasonable overheads.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.