Weitere Artikel dieser Ausgabe durch Wischen aufrufen
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The trustworthiness and connectivity of the network depends on the energy drain rate of mobile nodes. Colluders like vampire nodes in ad hoc network make it more vulnerable as they rapidly drain considerable amount of energy. This generic vampire attacks seem to capitalize on the potential features of the incorporated baseline protocol used for facilitating trustworthy data dissemination. The main goal of this paper is to formulate an attack prevention scheme that uses fuzzy trust relationship perspective for detecting vampire attacks and enforcing reduced energy drain rate of colluding mobile nodes. This fuzzy trust relationship perspective-based prevention mechanism (FTRPPM) initially estimates the associative trust and associative reputation of mobile nodes. Further, it quantifies the impact of factors that could induce vampire attack in the network under its influence. Finally, it facilitates the detection of vampire nodes based on the established ranges of threshold that are dynamically adjusted based on quantified level of probability factor. The empirical and simulation results of FTRPPM is confirmed to be exceptional as it ensures a remarkable improvement in mean PDR of 16% and mean throughput of 14% under the impact of increasing number of mobile nodes on par with the existing vampire attack mitigation schemes.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Macker, J. P., & Corson, M. S. (2005). Mobile ad hoc networks (MANETs): Routing technology for dynamic wireless networking. Mobile Ad Hoc Networking, 2(1), 255–273. CrossRef
Feeney, L. M. (2005). Energy-efficient communication in ad hoc wireless networks. Mobile Ad Hoc Networking, 3(1), 301–327. CrossRef
Poturalski, M., Papadimitratos, P., & Hubaux, J. (2013). Formal analysis of secure neighbor discovery in wireless networks. IEEE Transactions on Dependable and Secure Computing, 10(6), 355–367. CrossRef
Papadimitratos, P., Poturalski, M., Schaller, P., Lafourcade, P., Basin, D., Capkun, S., et al. (2008). Secure neighborhood discovery: A fundamental element for mobile ad hoc networking. IEEE Communications Magazine, 46(2), 132–139. CrossRef
Zhong, S., & Wu, F. (2007). On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking— MobiCom’07 (Vol. 1, No. 2, pp. 33–42).
Altman, E., Avrachenkov, K., & Garnaev, A. (2009). Jamming in wireless networks under uncertainty. In 2009 7th international symposium on modeling and optimization in mobile, ad hoc, and wireless networks (Vol. 1, No. 1, pp. 23–35).
Jaramillo, J. J., & Srikant, R. (2007). DARWIN. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking— MobiCom’07 (Vol. 1, No. 1, pp. 11–22).
Li, F., & Wu, J. (2008). Hit and run: A Bayesian game between malicious and regular nodes in MANETs. In 2008 5th annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks (Vol. 2, No. 1, pp. 23–34).
Li, X., Wu, Y., Xu, P., Chen, G., & Li, M. (2008). Hidden information and actions in multi-hop wireless ad hoc networks. In Proceedings of the 9th ACM international symposium on mobile ad hoc networking and computing and advancement— MobiHoc’08 (Vol. 2, No. 1, pp. 12–24).
Cardenas, A. A., Radosavac, S., & Baras, J. S. (2007). Performance comparison of detection schemes for MAC layer misbehavior. In IEEE INFOCOM 2007— 26th IEEE international conference on computer communications (Vol. 1, No. 2, pp. 43–52).
Joo, C., & Shroff, N. B. (2007). Performance of random access scheduling schemes in multi-hop wireless networks. In IEEE INFOCOM 2007— 26th IEEE international conference on computer communications (Vol. 3, No. 1, pp. 24–31).
Bhatia, R., Kashyap, A., & Li, L. (2007). The power balancing problem in energy constrained multi-hop wireless networks. In IEEE INFOCOM 2007— 26th IEEE international conference on computer communications (Vol. 1, No. 1, pp. 67–78).
Deng, J., Han, R., & Mishra, S. (2005). Defending against path-based DoS attacks in wireless networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks— SASN’05 (Vol. 2, No. 1, pp. 23–34).
Aad, I., Hubaux, J., & Knightly, E. W. (2004). Denial of service resilience in ad hoc networks. In Proceedings of the 10th annual international conference on Mobile computing and networking— MobiCom’04 (Vol. 1, No. 1, pp. 45–56).
Doshi, S., Bhandare, S., & Brown, T. X. (2002). An on-demand minimum energy routing protocol for a wireless ad hoc network. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 50. CrossRef
Fotino, M., & De, F. (2011). Energy issues and energy aware routing in wireless ad hoc networks. Mobile Ad-Hoc Networks: Protocol Design, 2(2), 45–61.
Stojmenovic, I., & Lin, X. (2001). Power-aware localized routing in wireless networks. IEEE Transactions on Parallel and Distributed Systems, 12(11), 1122–1133. CrossRef
Raikwar, M., & Mishra, P. (2017). A mitigation approach to protect wireless sensor networks over vampire attack. International Journal of Computer Applications, 159(7), 25–28. CrossRef
Vasserman, E. Y., & Hopper, N. (2013). Vampire attacks: Draining life from wireless ad hoc sensor networks. IEEE Transactions on Mobile Computing, 12(2), 318–332. CrossRef
Ye, J., & Dang, Y. (2017). A novel grey fixed weight cluster model based on interval grey numbers. Grey Systems: Theory and Application, 2(2), 12–22.
- A Fuzzy Trust Relationship Perspective-Based Prevention Mechanism for Vampire Attack in MANETs
P. Balaji Srikaanth
- Springer US
Neuer Inhalt/© Filograph | Getty Images | iStock