Proceedings of the International Conference for Phoenixes on Emerging Current Trends in Engineering and Management (PECTEAM 2018)

Detection of Mobile Replica Node Attacks in Mobile Computing Environment using GUIDE Technique

Authors
M Subathira Devi, G Sakthigopalan, S Santhoshkumar, D Karunkuzhali
Corresponding Author
M Subathira Devi
Available Online February 2018.
DOI
https://doi.org/10.2991/pecteam-18.2018.9How to use a DOI?
Keywords
Replica node reduction, Mobile Node, Pseudo random number, GUIDE (Greedy User IDEntification) technique
Abstract
Mobile computing is a term used to refer to a variety of devices that allow accessing data and information from anytime, anyplace, anywhere. The mobile networks are often deployed in complex environments in which to provide a secure transmission and also to detect the hackers. An adversary can capture and compromise mobile nodes, generate replicas of those nodes, and mount a variety of attacks with the replicas injects into the network. These attacks are dangerous because they allow the attacker to leverage and compromise of a few nodes to exert control over much of the network. Thus adversaries can capture some nodes, replicate them and deploy those replicas back into the strategic positions in the network to launch a variety of attacks. These are referred to as node replication attacks. Some methods of defending against node replication attacks have been proposed only in static networks. This paper proposes the work for mobile networks for detecting replica node attack. In this scenario, one of the dangerous attack is the replica attack, in which the adversary takes the secret keying materials from a compromised node, generates a large number of attacker-controlled replicas that share the node's keying materials and ID, and then spreads these replicas throughout the network. To prevent and avoid such replica nodes, each and every node has its own spread value generated by pseudo random number which is registered in base station including IP address along with their secret keying materials. Whenever mobile node sends packet through base station by transmission channel, at the time detection and verification of nodes were performed by applying GUIDE technique. Then the base station allows broadcasting the packets and reaching destination IP address. Thereby we can avoid the replica node attacks and also provide information of intruders in efficient manner to achieve effective and robust replica detection capability with reasonable overheads.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
International Conference for Phoenixes on Emerging Current Trends in Engineering and Management (PECTEAM 2018)
Part of series
Advances in Engineering Research
Publication Date
February 2018
ISBN
978-94-6252-492-7
ISSN
2352-5401
DOI
https://doi.org/10.2991/pecteam-18.2018.9How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - M Subathira Devi
AU  - G Sakthigopalan
AU  - S Santhoshkumar
AU  - D Karunkuzhali
PY  - 2018/02
DA  - 2018/02
TI  - Detection of Mobile Replica Node Attacks in Mobile Computing Environment using GUIDE Technique
BT  - International Conference for Phoenixes on Emerging Current Trends in Engineering and Management (PECTEAM 2018)
PB  - Atlantis Press
SP  - 47
EP  - 50
SN  - 2352-5401
UR  - https://doi.org/10.2991/pecteam-18.2018.9
DO  - https://doi.org/10.2991/pecteam-18.2018.9
ID  - SubathiraDevi2018/02
ER  -