Security

Black Hole Attack in Kerberos Assisted Authentication Protocol

Free registration required

Executive Summary

Kaman is the extension of Kerberos protocol; with the use of Kaman nodes in the ad hoc network are authenticated by the secure server. This posed the remedial venture to large number of attacks like replay attack, fabrication, eavesdropping etc Kaman provides secure solution to the problem of secure channel establishment, secure exchange of session keys and prevention of nodes identity forgery. In this paper, the authors reviewed the Kaman; Kerberos assisted Authentication in Mobile Ad hoc Network. They have also emphasized the problem of black hole that aroused when Kaman protocol is embedded into large network. AODV, on-demand routing protocol had been used to select secure shortest path, when node interacts with an authenticated server for mutual authentication.

  • Format: PDF
  • Size: 258.15 KB