Skip to main content
Erschienen in: The Journal of Supercomputing 12/2017

24.05.2017

DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system

verfasst von: Shahram Jamali, Reza Fotohi

Erschienen in: The Journal of Supercomputing | Ausgabe 12/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile ad hoc networks (MANETs) are mobile networks, which are automatically outspread on a geographically limited region, without requiring any preexisting infrastructure. Mostly, nodes are both self-governed and self-organized without requiring a central monitoring. Because of their distributed characteristic, MANETs are vulnerable to a particular routing misbehavior, called wormhole attack. In wormhole attack, one attacker node tunnels packet from its position to the other attacker nodes. Such wormhole attack results in a fake route with fewer hop count. If source node selects this fictitious route, attacker nodes have the options of delivering the packets or dropping them. For this reason, this paper proposes an improvement over AODV routing protocol to design a wormhole-immune routing protocol. The proposed protocol called defending against wormhole attack (DAWA) employs fuzzy logic system and artificial immune system to defend against wormhole attacks. DAWA is evaluated through extensive simulations in the NS-2 environment. The results show that DAWA outperforms other existing solutions in terms of false negative ratio, false positive ratio, detection ratio, packet delivery ratio, packets loss ratio and packets drop ratio.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Van G, Greeven MJ (2016) Mobile telecommunication standardization in Japan, China, the United States, and Europe: a comparison of regulatory and industrial regimes. Telecommunication Systems, p 1–12. doi:10.1007/s11235-016-0214-y Van G, Greeven MJ (2016) Mobile telecommunication standardization in Japan, China, the United States, and Europe: a comparison of regulatory and industrial regimes. Telecommunication Systems, p 1–12. doi:10.​1007/​s11235-016-0214-y
2.
Zurück zum Zitat Bricha N, Nourelfath M (2014) Extra-capacity versus protection for supply networks under attack. Reliab Eng Syst Saf 131:185–196CrossRef Bricha N, Nourelfath M (2014) Extra-capacity versus protection for supply networks under attack. Reliab Eng Syst Saf 131:185–196CrossRef
3.
Zurück zum Zitat Fotohi R, Ebazadeh Y, Geshlag MS (2016) A new approach for improvement security against DoS attacks in vehicular ad-hoc network. Int J Adv Comput Sci Appl 7:10–16 Fotohi R, Ebazadeh Y, Geshlag MS (2016) A new approach for improvement security against DoS attacks in vehicular ad-hoc network. Int J Adv Comput Sci Appl 7:10–16
4.
Zurück zum Zitat Fotohi R, Jamali SHA (2014) comprehensive study on defence against wormhole attack methods in mobile Ad hoc Networks. Int J Comput Sci Netw Solut 2:37–56 Fotohi R, Jamali SHA (2014) comprehensive study on defence against wormhole attack methods in mobile Ad hoc Networks. Int J Comput Sci Netw Solut 2:37–56
5.
Zurück zum Zitat Adewole KS, Anuar NB, Kamsin A, Varathan KD, Razak SA (2016) Malicious accounts: dark of the social networks. J Netw Comput Appl 79:41–67CrossRef Adewole KS, Anuar NB, Kamsin A, Varathan KD, Razak SA (2016) Malicious accounts: dark of the social networks. J Netw Comput Appl 79:41–67CrossRef
6.
Zurück zum Zitat Rana AI, Jennings B (2016) Semantic aware processing of user defined inference rules to manage home networks. J Netw Comput Appl 79:68–87 Rana AI, Jennings B (2016) Semantic aware processing of user defined inference rules to manage home networks. J Netw Comput Appl 79:68–87
7.
Zurück zum Zitat Vatn J, Aven T (2010) An approach to maintenance optimization where safety issues are important. Reliab Eng Syst Saf 95(1):58–63CrossRef Vatn J, Aven T (2010) An approach to maintenance optimization where safety issues are important. Reliab Eng Syst Saf 95(1):58–63CrossRef
8.
Zurück zum Zitat Fotohi R, Heydari R, Jamali SH (2016) A Hybrid routing method for mobile ad-hoc networks. J Adv Comput Res 7(3):93–103 Fotohi R, Heydari R, Jamali SH (2016) A Hybrid routing method for mobile ad-hoc networks. J Adv Comput Res 7(3):93–103
9.
Zurück zum Zitat Fotohi Reza et al (2013b) An Improvement over AODV routing protocol by limiting visited hop count. Int J Inf Technol Comput Sci (IJITCS) 5(9):87 Fotohi Reza et al (2013b) An Improvement over AODV routing protocol by limiting visited hop count. Int J Inf Technol Comput Sci (IJITCS) 5(9):87
11.
Zurück zum Zitat Jamali SH, Shaker V (2014) Defense against SYN flooding attacks: a particle swarm optimization approach. Comput Electr Eng 40(6):2013–2025CrossRef Jamali SH, Shaker V (2014) Defense against SYN flooding attacks: a particle swarm optimization approach. Comput Electr Eng 40(6):2013–2025CrossRef
12.
Zurück zum Zitat Maulik R, Chaki N, A comprehensive review on wormhole attacks in MANET. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), IEEE, 1010, pp 233–238 Maulik R, Chaki N, A comprehensive review on wormhole attacks in MANET. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), IEEE, 1010, pp 233–238
13.
Zurück zum Zitat Fotohi R, Jamali SH, Sarkohaki F (2013a) Performance evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV routing protocols. Int J Inf Technol Comput Sci (IJITCS) 5(10):21 Fotohi R, Jamali SH, Sarkohaki F (2013a) Performance evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV routing protocols. Int J Inf Technol Comput Sci (IJITCS) 5(10):21
14.
Zurück zum Zitat Drozda M, Schaust S, Szczerbicka H (2007) AIS for misbehavior detection in wireless sensor networks: performance and design principles. In: 2007 IEEE Congress on Evolutionary Computation, IEEE, pp 3719–3726 Drozda M, Schaust S, Szczerbicka H (2007) AIS for misbehavior detection in wireless sensor networks: performance and design principles. In: 2007 IEEE Congress on Evolutionary Computation, IEEE, pp 3719–3726
15.
Zurück zum Zitat Farmer JD, Packard NH, Perelson AS (1986) The immune system, adaptation, and machine learning. Phys D: Nonlinear Phenom 22(1):187–204CrossRefMathSciNet Farmer JD, Packard NH, Perelson AS (1986) The immune system, adaptation, and machine learning. Phys D: Nonlinear Phenom 22(1):187–204CrossRefMathSciNet
17.
Zurück zum Zitat Varela F, Coutinho A, Dupire B, Nelson N (1988) Cognitive networks: immune, neural and otherwise. In: Perelson AS (ed) Theoretical immunology, part two. SFI studies in the sciences of complexity, vol 3. Addison-Wesley, MA, pp 377–401 Varela F, Coutinho A, Dupire B, Nelson N (1988) Cognitive networks: immune, neural and otherwise. In: Perelson AS (ed) Theoretical immunology, part two. SFI studies in the sciences of complexity, vol 3. Addison-Wesley, MA, pp 377–401
20.
Zurück zum Zitat Teotia V, Dhurandher SK, Woungang I, Obaidat MS (2015) Wormhole prevention using COTA mechanism in position based environment over MANETs. In: 2015 IEEE International Conference on Communications (ICC), IEEE, pp 7036–7040 Teotia V, Dhurandher SK, Woungang I, Obaidat MS (2015) Wormhole prevention using COTA mechanism in position based environment over MANETs. In: 2015 IEEE International Conference on Communications (ICC), IEEE, pp 7036–7040
21.
Zurück zum Zitat Lu X, Dong D, Liao X (2013) WormPlanar: Topological planarization based wormhole detection in wireless networks. In: 2013 42nd International Conference on Parallel Processing, IEEE, pp 498–503 Lu X, Dong D, Liao X (2013) WormPlanar: Topological planarization based wormhole detection in wireless networks. In: 2013 42nd International Conference on Parallel Processing, IEEE, pp 498–503
22.
Zurück zum Zitat Amish P, Vaghela VB (2016) Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. 7th International Conference on Communication, Elsevier, pp 700–707 Amish P, Vaghela VB (2016) Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. 7th International Conference on Communication, Elsevier, pp 700–707
23.
Zurück zum Zitat Raju VK, Kumar KV (2012) A simple and efficient mechanism to detect and avoid wormhole attacks in mobile ad hoc networks. In: 2012 International Conference on Computing Sciences (ICCS), IEEE, pp 271–275 Raju VK, Kumar KV (2012) A simple and efficient mechanism to detect and avoid wormhole attacks in mobile ad hoc networks. In: 2012 International Conference on Computing Sciences (ICCS), IEEE, pp 271–275
24.
Zurück zum Zitat Patel A, Patel N, Patel R (2015). Defending against wormhole attack in MANET. In: 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT), IEEE, pp 674–678 Patel A, Patel N, Patel R (2015). Defending against wormhole attack in MANET. In: 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT), IEEE, pp 674–678
25.
Zurück zum Zitat Ji S, Chen T, Zhong S, Kak S (2014) Dawn: defending against wormhole attacks in wireless network coding systems. In: 2014 IEEE Conference on Computer Communications, IEEE INFOCOM, IEEE, pp 664–672 Ji S, Chen T, Zhong S, Kak S (2014) Dawn: defending against wormhole attacks in wireless network coding systems. In: 2014 IEEE Conference on Computer Communications, IEEE INFOCOM, IEEE, pp 664–672
26.
Zurück zum Zitat Patidar K, Dubey V (2014) Modification in routing mechanism of AODV for defending black hole and wormhole attacks. In: 2014 Conference on IT in Business, Industry and Government (CSIBIG), IEEE, pp 1–6 Patidar K, Dubey V (2014) Modification in routing mechanism of AODV for defending black hole and wormhole attacks. In: 2014 Conference on IT in Business, Industry and Government (CSIBIG), IEEE, pp 1–6
29.
Zurück zum Zitat Aloudat A, Michael K (2011) Toward the regulation of ubiquitous mobile government: a case study on location-based emergency services in Australia. Electron Commer Res 11(1):31–74. doi:10.1007/s10660-010-9070-0 CrossRef Aloudat A, Michael K (2011) Toward the regulation of ubiquitous mobile government: a case study on location-based emergency services in Australia. Electron Commer Res 11(1):31–74. doi:10.​1007/​s10660-010-9070-0 CrossRef
31.
Zurück zum Zitat Chiu HS, Lui KS (2006) Delphi: wormhole detection mechanism for ad hoc wireless networks. In: 2006 1st International Symposium on Wireless Pervasive Computing, IEEE, p 6 Chiu HS, Lui KS (2006) Delphi: wormhole detection mechanism for ad hoc wireless networks. In: 2006 1st International Symposium on Wireless Pervasive Computing, IEEE, p 6
32.
Zurück zum Zitat Qian L, Song N, Li X (2005) Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path. In: IEEE Wireless Communications and Networking Conference, IEEE, vol 4. pp 2106–2111 Qian L, Song N, Li X (2005) Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path. In: IEEE Wireless Communications and Networking Conference, IEEE, vol 4. pp 2106–2111
34.
Zurück zum Zitat Su X, Boppana RV (2007) On mitigating in-band wormhole attacks in mobile ad hoc networks. In: 2007 IEEE International Conference on Communications, IEEE, pp 1136–1141 Su X, Boppana RV (2007) On mitigating in-band wormhole attacks in mobile ad hoc networks. In: 2007 IEEE International Conference on Communications, IEEE, pp 1136–1141
36.
Zurück zum Zitat Maulik R, Chaki N, A comprehensive review on wormhole attacks in MANET. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), IEEE, 1010, pp 233–238 Maulik R, Chaki N, A comprehensive review on wormhole attacks in MANET. In: 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM), IEEE, 1010, pp 233–238
Metadaten
Titel
DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system
verfasst von
Shahram Jamali
Reza Fotohi
Publikationsdatum
24.05.2017
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 12/2017
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-017-2075-x

Weitere Artikel der Ausgabe 12/2017

The Journal of Supercomputing 12/2017 Zur Ausgabe