Skip to main content

2018 | OriginalPaper | Buchkapitel

BMWA: A Novel Model for Behavior Mapping for Wormhole Adversary Node in MANET

verfasst von : S. B. Geetha, Venkanagouda C. Patil

Erschienen in: Intelligent Computing and Information and Communication

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wormhole attack has received very less attention in the research community with respect to mobile ad hoc network (MANET). Majority of the security techniques are toward different forms of wireless network and less in MANET. Therefore, we introduce a model for behavior mapping for Wormhole Attacker considering the unknown and uncertain behavior of a wormhole node. The core idea is to find out the malicious node and statistically confirm if their communication behavior is very discrete from the normal node by formulating a novel strategic approach to construct effective decision. Our study outcome shows enhanced throughput and minimal overhead-latency with increasing number of wormhole node.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat R. Rajendran, A Survey on Multicast Routing Protocol and Its Challenges in Manet, Lap Lambert Academic Publishing, 2015 R. Rajendran, A Survey on Multicast Routing Protocol and Its Challenges in Manet, Lap Lambert Academic Publishing, 2015
2.
Zurück zum Zitat S. Paul, Introduction to MANET and Clustering in MANET, Anchor Academic Publishing-Computer, 2016 S. Paul, Introduction to MANET and Clustering in MANET, Anchor Academic Publishing-Computer, 2016
3.
Zurück zum Zitat A. Nadeem and M. P. Howarth, “A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks,” in IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2027–2045, Fourth Quarter 2013. A. Nadeem and M. P. Howarth, “A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks,” in IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2027–2045, Fourth Quarter 2013.
4.
Zurück zum Zitat S. Das and P. Nand, “Survey of hash security on DSR routing protocol,” 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, 2016, pp. 520–524. S. Das and P. Nand, “Survey of hash security on DSR routing protocol,” 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, 2016, pp. 520–524.
5.
Zurück zum Zitat Rawat, Danda B., Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, IGI Global, 2013 Rawat, Danda B., Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, IGI Global, 2013
6.
Zurück zum Zitat A. L. Sandoval Orozco, J. GarcıaMatesanz, L. J. Garcıa Villalba,J. D.M´arquez Dıaz, and T.-H. Kim, “Security Issues in Mobile Adhoc Networks”, Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks, 2012 A. L. Sandoval Orozco, J. GarcıaMatesanz, L. J. Garcıa Villalba,J. D.M´arquez Dıaz, and T.-H. Kim, “Security Issues in Mobile Adhoc Networks”, Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks, 2012
7.
Zurück zum Zitat P. M. Nanaware, S. D. Babar and A. Sinha, “Survey on bias minimization and application performance maximization using trust management in mobile adhoc networks,” 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 831–834. P. M. Nanaware, S. D. Babar and A. Sinha, “Survey on bias minimization and application performance maximization using trust management in mobile adhoc networks,” 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 831–834.
8.
Zurück zum Zitat P. Ramkumar, V. Vimala and G. S. Sundari, “Homogeneous and hetrogeneous intrusion detection system in mobile ad hoc networks,” 2016 International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE’16), Kovilpatti, 2016, pp. 1–5. P. Ramkumar, V. Vimala and G. S. Sundari, “Homogeneous and hetrogeneous intrusion detection system in mobile ad hoc networks,” 2016 International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE’16), Kovilpatti, 2016, pp. 1–5.
9.
Zurück zum Zitat [9] A. Lupia and F. De Rango, “A probabilistic energy-efficient approach for monitoring and detecting malicious/selfish nodes in mobile ad-hoc networks,” 2016 IEEE Wireless Communications and Networking Conference, Doha, 2016, pp. 1–6 [9] A. Lupia and F. De Rango, “A probabilistic energy-efficient approach for monitoring and detecting malicious/selfish nodes in mobile ad-hoc networks,” 2016 IEEE Wireless Communications and Networking Conference, Doha, 2016, pp. 1–6
10.
Zurück zum Zitat S.B. Geetha and V.C. Patil, “Evaluating the Research Trends and Techniques for Addressing Wormhole Attack in MANET”, International Journal of Computer Applications, Vol. 110, No. 6, 2015 S.B. Geetha and V.C. Patil, “Evaluating the Research Trends and Techniques for Addressing Wormhole Attack in MANET”, International Journal of Computer Applications, Vol. 110, No. 6, 2015
11.
Zurück zum Zitat R. Singh, J. Singh, and R. Singh, “WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks”, Mobile Information Systems, pp. 13, 2016 R. Singh, J. Singh, and R. Singh, “WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks”, Mobile Information Systems, pp. 13, 2016
12.
Zurück zum Zitat L. Lu, M.J. Hussain, G. Luo, and Z. Han, “Pworm: passive and real-time wormhole detection scheme for WSNs”, International Journal of Distributed Sensor Networks, pp. 16, 2015 L. Lu, M.J. Hussain, G. Luo, and Z. Han, “Pworm: passive and real-time wormhole detection scheme for WSNs”, International Journal of Distributed Sensor Networks, pp. 16, 2015
13.
Zurück zum Zitat S. Mukherjee, M. Chattopadhyay, S. Chattopadhyay, and P. Kar, “Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network”, Journal of Computer Networks and Communications, pp. 15, 2016 S. Mukherjee, M. Chattopadhyay, S. Chattopadhyay, and P. Kar, “Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network”, Journal of Computer Networks and Communications, pp. 15, 2016
14.
Zurück zum Zitat H. Chen, W. Chen, Z. Wang, Z. Wang, and Y. Li, “Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks”, International Journal of Distributed Sensor Networks, Vol. 10, No. 3, 2014 H. Chen, W. Chen, Z. Wang, Z. Wang, and Y. Li, “Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks”, International Journal of Distributed Sensor Networks, Vol. 10, No. 3, 2014
15.
Zurück zum Zitat R. Matam and S. Tripathy, “Secure Multicast Routing Algorithm for Wireless Mesh Networks”, Journal of Computer Networks and Communications, pp. 11, 2016 R. Matam and S. Tripathy, “Secure Multicast Routing Algorithm for Wireless Mesh Networks”, Journal of Computer Networks and Communications, pp. 11, 2016
16.
Zurück zum Zitat Y. Singh, A. Khatkar, P. Rani, and D.D. Barak, “Wormhole Attack Avoidance Technique in Mobile Adhoc Networks”, In Advanced Computing and Communication Technologies (ACCT), Third International Conference, pp. 283–287, 2013. Y. Singh, A. Khatkar, P. Rani, and D.D. Barak, “Wormhole Attack Avoidance Technique in Mobile Adhoc Networks”, In Advanced Computing and Communication Technologies (ACCT), Third International Conference, pp. 283–287, 2013.
17.
Zurück zum Zitat G. Kaur, V. K. Jain, and Y. Chaba, “Wormhole attacks: Performance evaluation of on demand routing protocols in Mobile Adhoc networks”, In Information and Communication Technologies (WICT), 2011 World Congress, pp. 1155–1158, 2011. G. Kaur, V. K. Jain, and Y. Chaba, “Wormhole attacks: Performance evaluation of on demand routing protocols in Mobile Adhoc networks”, In Information and Communication Technologies (WICT), 2011 World Congress, pp. 1155–1158, 2011.
18.
Zurück zum Zitat C. Gupta, and P. Pathak, “Movement based or neighbor based tehnique for preventing wormhole attack in MANET”, In Colossal Data Analysis and Networking (CDAN), Symposium, pp. 1–5, 2016. C. Gupta, and P. Pathak, “Movement based or neighbor based tehnique for preventing wormhole attack in MANET”, In Colossal Data Analysis and Networking (CDAN), Symposium, pp. 1–5, 2016.
19.
Zurück zum Zitat R. Stoleru, H. Wu, and H. Chenji, “Secure neighbor discovery and wormhole localization in mobile ad hoc networks”, Ad Hoc Networks, Vol. 10, No. 7, pp. 1179–1190, 2012 R. Stoleru, H. Wu, and H. Chenji, “Secure neighbor discovery and wormhole localization in mobile ad hoc networks”, Ad Hoc Networks, Vol. 10, No. 7, pp. 1179–1190, 2012
20.
Zurück zum Zitat A. Shastri and J. Joshi, “A Wormhole Attack in Mobile Ad-Hoc Network: Detection and Prevention”, In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, pp. 31, 2016 A. Shastri and J. Joshi, “A Wormhole Attack in Mobile Ad-Hoc Network: Detection and Prevention”, In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, pp. 31, 2016
21.
Zurück zum Zitat M. Ojha and R.S. Kushwah, “Improving Quality of Service of trust based system against wormhole attack by multi-path routing method”, In Soft Computing Techniques and Implementations (ICSCTI), 2015 International Conference, pp. 33–38, 2015 M. Ojha and R.S. Kushwah, “Improving Quality of Service of trust based system against wormhole attack by multi-path routing method”, In Soft Computing Techniques and Implementations (ICSCTI), 2015 International Conference, pp. 33–38, 2015
22.
Zurück zum Zitat S. Ali and P. Nand, “Comparative performance analysis of AODV and DSR routing protocols under wormhole attack in mobile ad hoc network on different node’s speeds”, In Computing, Communication and Automation (ICCCA), 2016 International Conference, (pp. 641–644), 2016 S. Ali and P. Nand, “Comparative performance analysis of AODV and DSR routing protocols under wormhole attack in mobile ad hoc network on different node’s speeds”, In Computing, Communication and Automation (ICCCA), 2016 International Conference, (pp. 641–644), 2016
23.
Zurück zum Zitat S. B. Geetha, V.C. Patil, “Elimination of Energy and Communication Tradeoff to Resist Wormhole Attack in MANET”, International Conference on Emerging Research in Electronics, Computer Science and Technology, pp. 143–148, 2015 S. B. Geetha, V.C. Patil, “Elimination of Energy and Communication Tradeoff to Resist Wormhole Attack in MANET”, International Conference on Emerging Research in Electronics, Computer Science and Technology, pp. 143–148, 2015
Metadaten
Titel
BMWA: A Novel Model for Behavior Mapping for Wormhole Adversary Node in MANET
verfasst von
S. B. Geetha
Venkanagouda C. Patil
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7245-1_49

Premium Partner