Weitere Artikel dieser Ausgabe durch Wischen aufrufen
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Wireless networks have emerged as a key enabling technology, expanding rapidly and offers numerous potential applications. The security issues have to be adequately addressed to realize the potential of multi-hop cooperative wireless network scenarios. The open nature of the wireless network is the opportunity for invaders launching various attacks with minimum effort owing to the multi-hop scenario of routing protocols. Routing protocols work based on the assumption that intermediate nodes are cooperating and well-behaving. Even in the presence of strong authentication mechanisms, detecting the continuous and selective packet dropping attack is a challenging process. This paper focuses on the design of a secure routing framework, and extend it to the routing protocols of various multi-hop wireless networks vulnerable to such attacks. The proposed hybrid security framework combats the routing misbehavior attacks in the presence of a wide range of malicious nodes. The proposed framework extends the hybrid security model adaptable to various multi-hop wireless networks with flexible routing overhead. The framework introduces a dummy packet based acknowledgment scheme that inserts dummy packets in the real payload traffic and masks the dummy traffic sequence through the dynamic traffic pattern. It optimizes the dummy packet generation based on the packet drop experienced and minimized the dummy traffic to balance the routing security and overhead. It confirms the presence of malicious nodes based on the dummy packet dropping and relies on the trust mechanism to eliminate the misbehaving nodes in the critical path. The use of subjective and fuzzy trust model validates the accuracy of uncertain evidence and contextual factors in the trust. The effectiveness of the framework is realized by applying it on various routing protocols in wireless networks. The performance evaluation confirms excellent packet delivery of the proposed hybrid framework over various networks in a highly vulnerable environment.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Chlamtac, I., Conti, M., & Liu, J. J. N. (2003). Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks, 1(1), 13–64. https://doi.org/10.1016/S1570-8705(03)00013-1. CrossRef
Adat, V., & Gupta, B. B. (2017). Security in internet of things: Issues, challenges, taxonomy, and architecture. Telecommunication System. https://doi.org/10.1007/s11235-017-0345-9.
RPL: IPv6 routing protocol for low power and lossy networks— http://tools.ietf.org/html/draft-ietf-roll-rpl-19. Accessed 2 Aug 2017.
Samian, N., Zukarnain, Z. A., Seah, W. K. G., Abdullah, A., & Hanapi, Z. M. (2015). Cooperation stimulation mechanisms for wireless multihop networks: A survey. Journal of Network and Computer Applications. https://doi.org/10.1016/j.jnca.2015.04.012.
Djahel, S., Nait-Abdesselam, F., & Zhang, Z. (2011). Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges. IEEE Communications Surveys & Tutorials, 13(4), 658–672. https://doi.org/10.1109/SURV.2011.072210.00026. CrossRef
Vamsi, P. R., & Kant, K. (2017). Generalized trust model for cooperative routing in MANETs. Wireless Personal Communications. https://doi.org/10.1007/s11277-017-4730-1.
Sakthivel, T., Chandrasekaran, R. M., & Vijay Bhanu, S. (2012). Random dummy packet distribution approach for detection of routing misbehavior in mobile ad hoc network. Journal of Computer Science, 8(11), 1914–1923. https://doi.org/10.3844/jcssp.2012.1914.1923. CrossRef
Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. Mobile Computing. https://doi.org/10.1007/978-0-585-29603-6_5.
Das, S. R., Belding-Royer, E. M., & Perkins, C. E. (2003). Ad hoc on-demand distance vector (AODV) routing, RFC3561.
Aghera, K., Pambhar, H., & Tada, N. (2017). MMR-LEACH: Multi-tier multi-hop routing in LEACH protocol. In Proceedings of international conference on communication and networks, part of the advances in intelligent systems and computing book series (AISC, volume 508), Online ISBN: 978-981-10-2750-5, Springer, Singapore.
Clausen, T., Yi, J., & Herberg, U. (2017). Lightweight on-demand ad hoc distance-vector routing-next generation (LOADng): Protocol, extension, and applicability. Computer Networks, 126, 125–140. https://doi.org/10.1016/j.comnet.2017.06.025. CrossRef
Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., & Daabaj, K. (2010). Adaptive ACK: A novel intrusion detection system to mitigate intended packet dropping in MANETs. In International Arab conference on information technology (ACIT 2010) (pp. 634–640).
Xia, H., Jia, Z., Li, X., Lei, J., & Sha, E. H. M. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114. https://doi.org/10.1016/j.adhoc.2012.02.009. CrossRef
Tornos, J. L., Salazar, J. L., & Piles, J. J. (2015). Secure trust management with source routing protocol for MANETs. Network Protocols and Algorithms, 7(2), 42–59. https://doi.org/10.5296/npa.v7i2.7816.
Bhushan, B., & Sahoo, G. (2017). Recent advances in attacks technical challenges vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-017-4962-0.
Deepa, C., & Latha, B. (2017). HHSRP: A cluster based hybrid hierarchical secure routing protocol for wireless sensor networks. Cluster Computing. https://doi.org/10.1007/s10586-017-1065-3.
Cho, Y., & Qu, G. (2013). Detection and prevention of selective forwarding-based denial-of-service attacks in WSNs. International Journal of Distributed Sensor Networks. https://doi.org/10.1155/2013/205920.
Kaur, J., Gill, S. S., & Dhaliwal, B. S. (2016). Secure trust based key management routing framework for wireless sensor networks. Journal of Engineering. https://doi.org/10.1155/2016/2089714.
Anita, X., Martin Leo Manickam, J., & Bhagyaveni, M. A. (2013). Two-way acknowledgment-based trust framework for wireless sensor networks. International Journal of Distributed Sensor Networks. https://doi.org/10.1155/2013/952905.
Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A survey. Journal of Network and Computer Applications. https://doi.org/10.1016/j.jnca.2016.03.006.
Mayzaud, A., Badonnel, R., & Chrisment, I. (2016). A taxonomy of attacks in RPL-based internet of things. International Journal of Network Security, 18(3), 459–473.
Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based internet of things. International Journal of Distributed Sensor Networks. https://doi.org/10.1155/2013/794326.
Anhtuan, L., Loo, J., Lasebae, A., Vinel, A., Yue, C., & Chai, M. (2013). The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sensors Journal. https://doi.org/10.1109/jsen.2013.2266399.
Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). A lightweight trust design for IoT routing. In Dependable, autonomic and secure computing, 14th international conference on pervasive intelligence and computing, https://doi.org/10.1109/dasc-picom-datacom-cyberscitec.2016.105.
Ahmed, F., & Ko, Y. B. (2016). Mitigation of black hole attacks in routing protocol for low power and lossy networks. Security and Communication Networks. https://doi.org/10.1002/sec.1684.
Weekly, K., & Pister, K. (2012). Evaluating sinkhole defense techniques in RPL networks. In 20th IEEE international conference on network protocols (ICNP) (pp. 1–6). https://doi.org/10.1109/icnp.2012.6459948.
Jangir, S. K., & Hemrajani, N. (2016). Evaluation of black hole, wormhole and sybil attacks in mobile ad hoc networks. In Proceedings of the second international conference on information and communication technology for competitive strategies (p. 74), ACM. https://doi.org/10.1145/2905055.2905133.
Balakrishnan, V., Varadharajan, V., & Tupakula, U. (2008). Subjective logic based trust model for mobile ad hoc networks. In Proceedings of the ACM 4th international conference on Security and privacy in communication networks (p. 30), https://doi.org/10.1145/1460877.1460916.
Rafsanjani, M. K., & Fatemidokht, H. (2015). FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs. AEU-International Journal of Electronics and Communications, 69(11), 1613–1621. https://doi.org/10.1016/j.aeue.2015.07.013. CrossRef
Xia, H., Jia, Z., Ju, L., Li, X., & Zhu, Y. (2011). A subjective trust management model with multiple decision factors for MANET based on AHP and fuzzy logic rules. IEEE/ACM International Conference on Green Computing and Communications (GreenCom). https://doi.org/10.1109/GreenCom.2011.30.
- A Dummy Packet-Based Hybrid Security Framework for Mitigating Routing Misbehavior in Multi-Hop Wireless Networks
R. M. Chandrasekaran
- Springer US
Neuer Inhalt/© Filograph | Getty Images | iStock