Skip to main content
Erschienen in: Neural Computing and Applications 1/2019

31.07.2018 | S.I. : Machine Learning Applications for Self-Organized Wireless Networks

RETRACTED ARTICLE: An efficient technique for mitigating stealthy attacks using MNDA in MANET

verfasst von: D. Muruganandam, J. Martin Leo Manickam

Erschienen in: Neural Computing and Applications | Sonderheft 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In mobile ad hoc networks, stealthy packet dropping is considered as a suite comprising four attacks, namely misrouting, control attacks, character designation and the conniving impact, that can be effectively propelled against mobile specially appointed systems. Stealthy packet dropping upsets the packets through malevolent conduct at a transitional node. This paper presents a novel stealthy assault location strategy for distinguishing packet misrouting in the constructed mobile ad hoc networks. Moreover, we propose a new algorithm called dynamic malicious node detection algorithm for identifying the stealthy attack nodes in mobile network environment. This is achieved in two stages. The first stage gathers additional information pertaining to the middle nodes and stores in a special table in the intermediate nodes. The second stage identifies the misbehaving nodes if any in a specified path. Finally, an alternate path is chosen to send the packets to fulfill the communication. Various performance criteria are evaluated for this work. The results of these analysis show that our proposed work is more efficient than the Bayesian linear model-based detection.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat D’Apice C, Manzo R (2006) Calculation of predicted average packet delay and its application for flow control in data network. J Inf Optim Sci 27(2):411–423MATH D’Apice C, Manzo R (2006) Calculation of predicted average packet delay and its application for flow control in data network. J Inf Optim Sci 27(2):411–423MATH
2.
Zurück zum Zitat Singh JP, Dutta P, Chakrabarti A (2014) Weighted delay prediction in mobile ad hoc network using fuzzy time series. Egypt Inform J 15:105–114CrossRef Singh JP, Dutta P, Chakrabarti A (2014) Weighted delay prediction in mobile ad hoc network using fuzzy time series. Egypt Inform J 15:105–114CrossRef
3.
Zurück zum Zitat Zafar S, Tariq H, Manzoor K (2016) Throughput and delay analysis of AODV, DSDV and DSR routing protocols in mobile ad hoc networks. Int J Comput Netw Appl 3(2):25–31 Zafar S, Tariq H, Manzoor K (2016) Throughput and delay analysis of AODV, DSDV and DSR routing protocols in mobile ad hoc networks. Int J Comput Netw Appl 3(2):25–31
4.
Zurück zum Zitat Elhoseny M, Tharwat A, Yuan X, Hassanien AE (2018) Optimizing K-coverage of mobile WSNs. Expert Syst Appl 92:142–153CrossRef Elhoseny M, Tharwat A, Yuan X, Hassanien AE (2018) Optimizing K-coverage of mobile WSNs. Expert Syst Appl 92:142–153CrossRef
6.
Zurück zum Zitat Khalil I, Bagchi S (2011) Stealthy attacks in wireless ad hoc networks: detection and countermeasure. IEEE Trans Mob Comput 10(8):1096–1112CrossRef Khalil I, Bagchi S (2011) Stealthy attacks in wireless ad hoc networks: detection and countermeasure. IEEE Trans Mob Comput 10(8):1096–1112CrossRef
7.
Zurück zum Zitat Beshr FB, Ishaq AB, Aljabri S, Sheltami TR (2016) A guard node (GN) based technique against misbehaving nodes in MANET. J Ubiquitous Syst Pervasive Netw 7(1):13–17CrossRef Beshr FB, Ishaq AB, Aljabri S, Sheltami TR (2016) A guard node (GN) based technique against misbehaving nodes in MANET. J Ubiquitous Syst Pervasive Netw 7(1):13–17CrossRef
8.
Zurück zum Zitat Khalil I (2008) MIMI: mitigating packet misrouting in locally-monitored multi-hop wireless ad hoc networks. In: IEEE GLOBECOM 2008—2008 IEEE global telecommunications conference, New Orleans, LO, pp 1–5 Khalil I (2008) MIMI: mitigating packet misrouting in locally-monitored multi-hop wireless ad hoc networks. In: IEEE GLOBECOM 2008—2008 IEEE global telecommunications conference, New Orleans, LO, pp 1–5
9.
Zurück zum Zitat Stoleru R, Wu H, Chenji H (2011) Secure neighbor discovery in mobile ad hoc networks. In: 2011 IEEE eighth international conference on mobile ad-hoc and sensor systems, Valencia, pp 35–42 Stoleru R, Wu H, Chenji H (2011) Secure neighbor discovery in mobile ad hoc networks. In: 2011 IEEE eighth international conference on mobile ad-hoc and sensor systems, Valencia, pp 35–42
10.
Zurück zum Zitat Čapkun S, Hamdi M, Hubaux JP (2001) GPS-free positioning in mobile ad-hoc networks. In: Proceedings of the 34th annual Hawaii international conference on system sciences, Maui, HI, USA, p 10 Čapkun S, Hamdi M, Hubaux JP (2001) GPS-free positioning in mobile ad-hoc networks. In: Proceedings of the 34th annual Hawaii international conference on system sciences, Maui, HI, USA, p 10
11.
Zurück zum Zitat Manickam JML, Muruganandam D (2015) A survey on attacks in wireless networks. Aust J Basic Appl Sci 9(21):72–78 Manickam JML, Muruganandam D (2015) A survey on attacks in wireless networks. Aust J Basic Appl Sci 9(21):72–78
12.
Zurück zum Zitat Tuli H, Kumar S (2014) A review on delay prediction techniques in MANET. Int J Comput Appl 108(14):12–14 Tuli H, Kumar S (2014) A review on delay prediction techniques in MANET. Int J Comput Appl 108(14):12–14
13.
Zurück zum Zitat Aoki M, Oki E, Rojas-Cessa R (2010) Scheme to measure one-way delay variation with detection and removal of clock skew. In: 2010 International conference on high performance switching and routing, Richardson, TX, pp 159–164 Aoki M, Oki E, Rojas-Cessa R (2010) Scheme to measure one-way delay variation with detection and removal of clock skew. In: 2010 International conference on high performance switching and routing, Richardson, TX, pp 159–164
14.
Zurück zum Zitat Saini R, Khari M (2011) Defining malicious behavior of a node and its defensive techniques in ad hoc networks. Int J Smart Sens Ad Hoc Netw 1(1):17–20CrossRef Saini R, Khari M (2011) Defining malicious behavior of a node and its defensive techniques in ad hoc networks. Int J Smart Sens Ad Hoc Netw 1(1):17–20CrossRef
15.
Zurück zum Zitat Oo MZ, Othman M, O’Farrell T (2016) A proxy acknowledgement mechanism for TCP variants in mobile ad hoc networks. J Commun Netw 18(2):238–245CrossRef Oo MZ, Othman M, O’Farrell T (2016) A proxy acknowledgement mechanism for TCP variants in mobile ad hoc networks. J Commun Netw 18(2):238–245CrossRef
16.
Zurück zum Zitat Balakrishnan K, Deng J, Varshney VK (2005) TWOACK: preventing selfishness in mobile ad hoc networks. IEEE Wirel Commun Netw Confrence 4:2137–2142 Balakrishnan K, Deng J, Varshney VK (2005) TWOACK: preventing selfishness in mobile ad hoc networks. IEEE Wirel Commun Netw Confrence 4:2137–2142
17.
Zurück zum Zitat Ojetunde B, Shibata N, Gao J (2017) Secure payment system utilizing MANET for disaster areas. IEEE Trans Syst Man Cybern Syst 99:1–13 Ojetunde B, Shibata N, Gao J (2017) Secure payment system utilizing MANET for disaster areas. IEEE Trans Syst Man Cybern Syst 99:1–13
18.
Zurück zum Zitat Khan MS, Midi D, Khan MI, Bertino E (2017) Fine-grained analysis of packet loss in MANETs. IEEE Access 5:7798–7807CrossRef Khan MS, Midi D, Khan MI, Bertino E (2017) Fine-grained analysis of packet loss in MANETs. IEEE Access 5:7798–7807CrossRef
19.
Zurück zum Zitat Tsuda T, Komai Y, Hara T, Nishio S (2016) Top-k query processing and malicious node identification based on node grouping in MANETs. IEEE Access 4:993–1007CrossRef Tsuda T, Komai Y, Hara T, Nishio S (2016) Top-k query processing and malicious node identification based on node grouping in MANETs. IEEE Access 4:993–1007CrossRef
20.
Zurück zum Zitat Chang JM, Tsou PC, Woungang I, Chao HC, Lai CF (2015) Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach. IEEE Syst J 9(1):65–75CrossRef Chang JM, Tsou PC, Woungang I, Chao HC, Lai CF (2015) Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach. IEEE Syst J 9(1):65–75CrossRef
21.
Zurück zum Zitat Surendran S, Prakash S (2015) An ACO look-ahead approach to QOS enabled fault-tolerant routing in MANETs. China Commun 12(8):93–110CrossRef Surendran S, Prakash S (2015) An ACO look-ahead approach to QOS enabled fault-tolerant routing in MANETs. China Commun 12(8):93–110CrossRef
22.
Zurück zum Zitat Shabut AM, Dahal KP, Bista SK, Awan IU (2015) Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans Mob Comput 14(10):2101–2115CrossRef Shabut AM, Dahal KP, Bista SK, Awan IU (2015) Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans Mob Comput 14(10):2101–2115CrossRef
23.
Zurück zum Zitat Schweitzer N, Stulman A, Margalit RD, Shabtai A (2017) Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans Mob Comput 16(8):2174–2183CrossRef Schweitzer N, Stulman A, Margalit RD, Shabtai A (2017) Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans Mob Comput 16(8):2174–2183CrossRef
24.
Zurück zum Zitat Yi Z, Dohi T (2015) Toward highly dependable power-aware mobile ad hoc network-survivability evaluation framework. IEEE Access 3:2665–2676CrossRef Yi Z, Dohi T (2015) Toward highly dependable power-aware mobile ad hoc network-survivability evaluation framework. IEEE Access 3:2665–2676CrossRef
25.
Zurück zum Zitat Mejri MN, Ben-Othman J (2017) GDVAN: a new greedy behavior attack detection algorithm for VANETs. IEEE Trans Mob Comput 16(3):759–771CrossRef Mejri MN, Ben-Othman J (2017) GDVAN: a new greedy behavior attack detection algorithm for VANETs. IEEE Trans Mob Comput 16(3):759–771CrossRef
26.
Zurück zum Zitat Paramasivan B, Prakash MJV, Kaliappan M (2015) Development of a secure routing protocol using game theory model in mobile ad hoc networks. J Commun Netw 17(1):75–83CrossRef Paramasivan B, Prakash MJV, Kaliappan M (2015) Development of a secure routing protocol using game theory model in mobile ad hoc networks. J Commun Netw 17(1):75–83CrossRef
27.
Zurück zum Zitat Ganapathy S, Kulothungan K, Muthurajkumar S, Vijayalakshmi M, Yogesh P, Kannan A (2013) Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J Wirel Commun Netw 271:1–16 Ganapathy S, Kulothungan K, Muthurajkumar S, Vijayalakshmi M, Yogesh P, Kannan A (2013) Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J Wirel Commun Netw 271:1–16
28.
Zurück zum Zitat Logambigai R, Ganapathy S, Kannan A (2018) Energy-efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Comput Electr Eng 68:62–75CrossRef Logambigai R, Ganapathy S, Kannan A (2018) Energy-efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Comput Electr Eng 68:62–75CrossRef
30.
Zurück zum Zitat Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2017) An intelligent secured and energy efficient routing algorithm for MANETs. Wirel Pers Commun 96(2):1753–1769CrossRef Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2017) An intelligent secured and energy efficient routing algorithm for MANETs. Wirel Pers Commun 96(2):1753–1769CrossRef
31.
Zurück zum Zitat Zhang W, He X (2018) Stealthy attack detection and solution strategy for consensus-based distributed economic dispatch problem. Int J Electr Power Energy Syst 103:233–246CrossRef Zhang W, He X (2018) Stealthy attack detection and solution strategy for consensus-based distributed economic dispatch problem. Int J Electr Power Energy Syst 103:233–246CrossRef
Metadaten
Titel
RETRACTED ARTICLE: An efficient technique for mitigating stealthy attacks using MNDA in MANET
verfasst von
D. Muruganandam
J. Martin Leo Manickam
Publikationsdatum
31.07.2018
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe Sonderheft 1/2019
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-018-3634-7

Weitere Artikel der Sonderheft 1/2019

Neural Computing and Applications 1/2019 Zur Ausgabe

Machine Learning Applications for Self-Organized Wireless Networks

An improved image mixed noise removal algorithm based on super-resolution algorithm and CNN

Machine Learning Applications for Self-Organized Wireless Networks

Jointly network: a network based on CNN and RBM for gesture recognition