International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 66 - Issue 20 |
Published: March 2013 |
Authors: Navjot Singh, Rupinder Kaur Cheema |
![]() |
Navjot Singh, Rupinder Kaur Cheema . Black Hole Attack in Kerberos Assisted Authentication Protocol. International Journal of Computer Applications. 66, 20 (March 2013), 24-27. DOI=10.5120/11201-6394
@article{ 10.5120/11201-6394, author = { Navjot Singh,Rupinder Kaur Cheema }, title = { Black Hole Attack in Kerberos Assisted Authentication Protocol }, journal = { International Journal of Computer Applications }, year = { 2013 }, volume = { 66 }, number = { 20 }, pages = { 24-27 }, doi = { 10.5120/11201-6394 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2013 %A Navjot Singh %A Rupinder Kaur Cheema %T Black Hole Attack in Kerberos Assisted Authentication Protocol%T %J International Journal of Computer Applications %V 66 %N 20 %P 24-27 %R 10.5120/11201-6394 %I Foundation of Computer Science (FCS), NY, USA
Kaman is the extension of Kerberos protocol; with the use of Kaman nodes in the ad hoc network are authenticated by the secure server. This posed the remedial venture to large number of attacks like replay attack, fabrication, eavesdropping etc Kaman provides secure solution to the problem of secure channel establishment, secure exchange of session keys and prevention of nodes identity forgery. In this paper, we reviewed the Kaman; Kerberos assisted Authentication in Mobile Ad hoc Network. We have also emphasized the problem of black hole that aroused when Kaman protocol is embedded into large network. AODV, on-demand routing protocol had been used to select secure shortest path, when node interacts with an authenticated server for mutual authentication.