ISSN: 2229-371X
IMPROVED BOOTSTRAP SECURITY WITH CONSISTENT CACHE IN MOBILE AD HOC NETWORK ROUTING
Dynamic node mobility of Mobile Ad hoc Network (MANETs) causes security concern over routing and data communication. Recent research works focused on trust worthiness, routing protocol security, denial of service attacks, etc., More focus is made on bootstrap security which for authenticated and secured neighbor relationships between mobile nodes. Our previous work presented bootstrap security scheme capitalizing neighbor node relationship and share knowledge information of other nodes in dynamic MANET. The bootstrap security handles subverted node and the subverted link attacks efficiently. However inconsistence in the cache causes improper information being shared between the neighboring nodes. The improper or faulty information sharing between nodes, leads to various security threats. In this work we present an improved bootstrap security model with efficient cache consistency scheme to share proper and correct information sharing between the mobile nodes of the ad hoc network. The improved bootstrap security minimizes attacks in query nodes of server control cache and eliminates fake requests in query nodes. Cache consistency scheme is a server control mechanism adapts the process of caching a data item and instructs the query node to updates data in the respective mobile cache nodes. NS-2 Simulations are carried out to analyze the performance of improved bootstrap security for query node from passive and active attacks with average data request response time, cache update delay, and bandwidth utilization. The simulation topology is constructed to analyze adversary correctness and anticipation of cache consistency of the cache nodes updated to query nodes. The performance of improved bootstrap security shows an improvement of 15% in terms of control packets information sharing between mobile nodes. The improved bootstrap security shows 35% of improvement in data delivery ratio compared to that of conventional bootstrap security.
P. Parameswari , C. Chandrasekar
To read the full article Download Full Article