Pallavi Sharma’s research while affiliated with Atal Bihari Vajpayee Indian Institute of Information Technology and Management and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


An approach to defend against wormhole attack in ad hoc network using digital signature
  • Article

May 2011

·

107 Reads

·

31 Citations

Pallavi Sharma

·

Ad hoc networks are vulnerable due to their structure less property. A Mobile Ad-Hoc Network (MANET) is an infrastructure less collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources. They also have capability of network partition. The Wormhole attack is the most attention seeking attack in ad hoc networks; it consists of two malicious nodes and a tunnel between malicious nodes. I n wormhole attack, attacker records the packets at one location and tunnels them in another location in same network or in different network. In this paper, we present a mechanism which is helpful in prevention of wormhole attack in ad hoc network is verification of digital signatures of sending nodes by receiving node because each legitimate node in the network contains the digital signature of every other legitimate nodes of same network. In proposed solution, if sender wants to send the data to destination, firstly it creates a secure path between sender and receiver with the help of verification of digital signature. If there is presence of any malicious node in between the path then it is identified because malicious node does not have its own legal digital signature.

Citations (1)


... These alternative solutions deal with different kinds of attacks [12]. For instance, [14] proposed a cooperative approach to detect and mitigate the Wormhole attack while [26] used a digital signature to prevent this kind of attack executed by colliding nodes. Byzantine failure was addressed in [23] and [31] where the implemented methods make its decision based on the trust of its neighbors and the performance provided by them. ...

Reference:

Defending Against Smart Grayhole Attack Within MANETs: A Reputation-Based Ant Colony Optimization Approach for Secure Route Discovery in DSR Protocol
An approach to defend against wormhole attack in ad hoc network using digital signature
  • Citing Article
  • May 2011