VIJAY PALANISAMY - Academia.edu (original) (raw)
Uploads
Papers by VIJAY PALANISAMY
Computing Research Repository, 2009
A mobile ad hoc network (MANETs) is a selforganizing system of mobile nodes that communicate with... more A mobile ad hoc network (MANETs) is a selforganizing system of mobile nodes that communicate with each other via wireless links with no fixed infrastructure or centralized administration such as base station or access points. Nodes in a MANETs operate both as host as well as routers to forward packets for each other in a multi-hop fashion. For many applications in wireless networks, multicasting is an important and frequent communication service. By multicasting, since a single message can be delivered to multiple receivers simultaneously. It greatly reduces the transmission cost when sending the same packet to multiple recipients.
In wireless and distributed nature of Ad hoc networks, security has become a more sophisticated p... more In wireless and distributed nature of Ad hoc networks, security has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. This paper is based on Blackhole attack. This attack node first needs to invade into the multicast forwarding group. It then absorbs all the data packets in the network and drops fully or partially. So, that the destination node does not get the data packets fully and this will affect the packet delivery ratio (PDR). In this paper, the goal is to measure the impact of Balckhole attack and their node positions which affect the performance metrics of packet delivery with respect to three scenarios: Black hole attack node near sender, blackhole attack node near receiver and anywhere within the network. The performance of PDR with respect to above three scenarios is also compared.
International Journal of Computer Applications, 2010
In Recent years, secure communications have become an important subject of research. The new serv... more In Recent years, secure communications have become an important subject of research. The new service for wireless and wired networks is to provide confidentiality, authentication, authorization and data integrity. Security has always been a sensitive issue. In fact, this service becomes necessary to protect basic applications, especially E-commerce and bank transactions from a variety of attacks. An ad hoc network is a kind of wireless communication infrastructure that does not have base stations or routers. Each node acts as a router and is responsible for dynamically discovering other nodes it can directly communicate with. However, when a message without encryption is sent out through a general tunnel, it may be maliciously attacked. Securing group communication and group key establishment for ad hoc networks is covered in this paper. For a secure group communication in ad hoc networks, a group key is needed to be shared between group members to encrypt group messages. The main idea is to have group members actively participate to the security of the multicast group, therefore reducing the communication and computation load on the source. Since the group security is distributed among the group members, we propose a service right certificate, to verify that a node is authorized to join the group, and also a corresponding revocation mechanism.
Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast ... more Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast communication. The security challenges faced by the network due to their inherent unique characteristics are exacerbated in case of multicast communication. Group communication in ad hoc network is susceptible to a host of outsider and insider attacks. The security solutions proposed for the outsider attack cannot be directly applied to the insider attack due to their disparate behavior. The compromise of the authenticated and trusted node in the network by Sybil attack poses serious implications. Online auction has been taken as a case study to probe the effect of Sybil attack in the multicast communication, as it supports the formation of secure group. Sybil attack is an attack where an adversary illegitimately forges the identities of the other genuine node by disabling them after launching a DoS attack on it. Iolus framework, a supporter of creation of secure multicast distribution tree with group security agent (GSA) is deployed with MAODV as the underlying protocol. The impact of the compromise of the GSA in the multicast tree by Sybil attack is analyzed with packet delivery ratio as the performance metric. Theoretical based simulated graphs are presented to analyze the performance of the ad hoc network in the presence and absence of Sybil attack. Existing solutions have been discussed and their limitations are addressed by tweaking them to propose a CNIRL (compromised node identity revocation list).
... The network which has a multi-hop routing nature due to the potentiality of all-node-as-route... more ... The network which has a multi-hop routing nature due to the potentiality of all-node-as-router characteristic is vulnerable to various routing attacks. ... Separate blacklist, Self trust. Transport Flooding Desynchronization. Client Puzzles Authentication. ...
An ad hoc network is a kind of wireless communication infrastructure that does not have base stat... more An ad hoc network is a kind of wireless communication infrastructure that does not have base stations or routers. Each node acts as a router and is responsible for dynamically discovering other nodes it can directly communicate with. However, when a message without encryption is sent out through a general tunnel, it may be maliciously attacked. Ad hoc networks are increasingly growing these days and security field in ad hoc network communication has become a common research field. This paper addresses the problem of geocasting in mobile ad hoc network (MANET) environments. Geocast is useful for sending messages to everyone in a specified geographical region. Geocasting is a variant of the conventional multicasting problem. For multicasting, conventional protocols define a multicast group as a collection of hosts which register to a multicast group address. However, for geocasting, the group consists of the set of all nodes within a specified geographical region. Securing group communication and group key establishment for geocasting in ad hoc networks is covered in this paper. For a secure geocasting in ad hoc network for group communication, a group key is needed to be shared between group members to encrypt group messages. The main idea is to have group members actively participate to the security of the multicast group, therefore reducing the communication and computation load on the source. Since the group security is distributed among the group members in the specified geographical region.
Computing Research Repository, 2009
A mobile ad hoc network (MANETs) is a selforganizing system of mobile nodes that communicate with... more A mobile ad hoc network (MANETs) is a selforganizing system of mobile nodes that communicate with each other via wireless links with no fixed infrastructure or centralized administration such as base station or access points. Nodes in a MANETs operate both as host as well as routers to forward packets for each other in a multi-hop fashion. For many applications in wireless networks, multicasting is an important and frequent communication service. By multicasting, since a single message can be delivered to multiple receivers simultaneously. It greatly reduces the transmission cost when sending the same packet to multiple recipients.
In wireless and distributed nature of Ad hoc networks, security has become a more sophisticated p... more In wireless and distributed nature of Ad hoc networks, security has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. This paper is based on Blackhole attack. This attack node first needs to invade into the multicast forwarding group. It then absorbs all the data packets in the network and drops fully or partially. So, that the destination node does not get the data packets fully and this will affect the packet delivery ratio (PDR). In this paper, the goal is to measure the impact of Balckhole attack and their node positions which affect the performance metrics of packet delivery with respect to three scenarios: Black hole attack node near sender, blackhole attack node near receiver and anywhere within the network. The performance of PDR with respect to above three scenarios is also compared.
International Journal of Computer Applications, 2010
In Recent years, secure communications have become an important subject of research. The new serv... more In Recent years, secure communications have become an important subject of research. The new service for wireless and wired networks is to provide confidentiality, authentication, authorization and data integrity. Security has always been a sensitive issue. In fact, this service becomes necessary to protect basic applications, especially E-commerce and bank transactions from a variety of attacks. An ad hoc network is a kind of wireless communication infrastructure that does not have base stations or routers. Each node acts as a router and is responsible for dynamically discovering other nodes it can directly communicate with. However, when a message without encryption is sent out through a general tunnel, it may be maliciously attacked. Securing group communication and group key establishment for ad hoc networks is covered in this paper. For a secure group communication in ad hoc networks, a group key is needed to be shared between group members to encrypt group messages. The main idea is to have group members actively participate to the security of the multicast group, therefore reducing the communication and computation load on the source. Since the group security is distributed among the group members, we propose a service right certificate, to verify that a node is authorized to join the group, and also a corresponding revocation mechanism.
Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast ... more Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast communication. The security challenges faced by the network due to their inherent unique characteristics are exacerbated in case of multicast communication. Group communication in ad hoc network is susceptible to a host of outsider and insider attacks. The security solutions proposed for the outsider attack cannot be directly applied to the insider attack due to their disparate behavior. The compromise of the authenticated and trusted node in the network by Sybil attack poses serious implications. Online auction has been taken as a case study to probe the effect of Sybil attack in the multicast communication, as it supports the formation of secure group. Sybil attack is an attack where an adversary illegitimately forges the identities of the other genuine node by disabling them after launching a DoS attack on it. Iolus framework, a supporter of creation of secure multicast distribution tree with group security agent (GSA) is deployed with MAODV as the underlying protocol. The impact of the compromise of the GSA in the multicast tree by Sybil attack is analyzed with packet delivery ratio as the performance metric. Theoretical based simulated graphs are presented to analyze the performance of the ad hoc network in the presence and absence of Sybil attack. Existing solutions have been discussed and their limitations are addressed by tweaking them to propose a CNIRL (compromised node identity revocation list).
... The network which has a multi-hop routing nature due to the potentiality of all-node-as-route... more ... The network which has a multi-hop routing nature due to the potentiality of all-node-as-router characteristic is vulnerable to various routing attacks. ... Separate blacklist, Self trust. Transport Flooding Desynchronization. Client Puzzles Authentication. ...
An ad hoc network is a kind of wireless communication infrastructure that does not have base stat... more An ad hoc network is a kind of wireless communication infrastructure that does not have base stations or routers. Each node acts as a router and is responsible for dynamically discovering other nodes it can directly communicate with. However, when a message without encryption is sent out through a general tunnel, it may be maliciously attacked. Ad hoc networks are increasingly growing these days and security field in ad hoc network communication has become a common research field. This paper addresses the problem of geocasting in mobile ad hoc network (MANET) environments. Geocast is useful for sending messages to everyone in a specified geographical region. Geocasting is a variant of the conventional multicasting problem. For multicasting, conventional protocols define a multicast group as a collection of hosts which register to a multicast group address. However, for geocasting, the group consists of the set of all nodes within a specified geographical region. Securing group communication and group key establishment for geocasting in ad hoc networks is covered in this paper. For a secure geocasting in ad hoc network for group communication, a group key is needed to be shared between group members to encrypt group messages. The main idea is to have group members actively participate to the security of the multicast group, therefore reducing the communication and computation load on the source. Since the group security is distributed among the group members in the specified geographical region.