Skip to main content

2018 | OriginalPaper | Buchkapitel

Detection and Removal of Security Attacks Using ALARM Protocol in WSN Environment

verfasst von : Seema Rawat, Praveen Kumar, Bhawna Dhruv

Erschienen in: Cyber Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A mobile ad hoc network comprises many mobile wireless nodes. MANET is a self-configuring network and such network can be organized easily without any base station. MANET can be very efficiently used in salvage-related area, military, and law enforcement. But it faces the issues of security and confidentiality, especially when used in susceptible areas. Safe routing protocols have been refined to provide protection and confidentiality at various levels, e.g., ALARM protocol (Anonymous Location-Aided Routing) provides both privacy features and security, which include data virtue, node verification, and obscurity. This network focuses on achieving the major security objectives which are confidentiality, authentication, authorization, and integrity. In this paper, we have proposed ALARM protocol in WSN environment which uses network time protocol synchronization and removes the malicious node from the network, hence preventing the network from attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Levya Mayorga I (2014) Performance analysis of a non preemptive hybrid WSN protocol in mobile environment. In: 28th international conference on advanced information networking and applications workshop, IEEE, pp 486–491, May 2014 Levya Mayorga I (2014) Performance analysis of a non preemptive hybrid WSN protocol in mobile environment. In: 28th international conference on advanced information networking and applications workshop, IEEE, pp 486–491, May 2014
2.
Zurück zum Zitat Shen H, Zhoa L (2013) ALERT: anonymous location based efficient routing protocol in MANET. IEEE Trans Mob Comput 12(6) June 2013 Shen H, Zhoa L (2013) ALERT: anonymous location based efficient routing protocol in MANET. IEEE Trans Mob Comput 12(6) June 2013
3.
Zurück zum Zitat Agarwal P, Ghosh RK (2008) Cooperative black and gray hole attacks in mobile Ad hoc network. In: 2nd international conference on ubiquitous IMC, Korea Agarwal P, Ghosh RK (2008) Cooperative black and gray hole attacks in mobile Ad hoc network. In: 2nd international conference on ubiquitous IMC, Korea
4.
Zurück zum Zitat El Defrway K, Tsudik G (2011) ALARM: anonymous location aided routing in suspicious MANET. IEEE Trans Mob Comput 10 Sept 2011 El Defrway K, Tsudik G (2011) ALARM: anonymous location aided routing in suspicious MANET. IEEE Trans Mob Comput 10 Sept 2011
5.
Zurück zum Zitat Cheng Y, Agarwal D (2005) Distributed anonymous secure routing protocol in wireless MANET. OPNETWORK Cheng Y, Agarwal D (2005) Distributed anonymous secure routing protocol in wireless MANET. OPNETWORK
6.
Zurück zum Zitat Koulali MA, Kobbane A (2012) Optimal distributed relay selection for duty cycling wireless sensor network. In: Global communication conference, IEEE, pp 145–150, Dec 2012 Koulali MA, Kobbane A (2012) Optimal distributed relay selection for duty cycling wireless sensor network. In: Global communication conference, IEEE, pp 145–150, Dec 2012
Metadaten
Titel
Detection and Removal of Security Attacks Using ALARM Protocol in WSN Environment
verfasst von
Seema Rawat
Praveen Kumar
Bhawna Dhruv
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8536-9_41