Skip to main content
Top
Published in: Wireless Personal Communications 3/2018

11-05-2018

A Dummy Packet-Based Hybrid Security Framework for Mitigating Routing Misbehavior in Multi-Hop Wireless Networks

Authors: T. Sakthivel, R. M. Chandrasekaran

Published in: Wireless Personal Communications | Issue 3/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless networks have emerged as a key enabling technology, expanding rapidly and offers numerous potential applications. The security issues have to be adequately addressed to realize the potential of multi-hop cooperative wireless network scenarios. The open nature of the wireless network is the opportunity for invaders launching various attacks with minimum effort owing to the multi-hop scenario of routing protocols. Routing protocols work based on the assumption that intermediate nodes are cooperating and well-behaving. Even in the presence of strong authentication mechanisms, detecting the continuous and selective packet dropping attack is a challenging process. This paper focuses on the design of a secure routing framework, and extend it to the routing protocols of various multi-hop wireless networks vulnerable to such attacks. The proposed hybrid security framework combats the routing misbehavior attacks in the presence of a wide range of malicious nodes. The proposed framework extends the hybrid security model adaptable to various multi-hop wireless networks with flexible routing overhead. The framework introduces a dummy packet based acknowledgment scheme that inserts dummy packets in the real payload traffic and masks the dummy traffic sequence through the dynamic traffic pattern. It optimizes the dummy packet generation based on the packet drop experienced and minimized the dummy traffic to balance the routing security and overhead. It confirms the presence of malicious nodes based on the dummy packet dropping and relies on the trust mechanism to eliminate the misbehaving nodes in the critical path. The use of subjective and fuzzy trust model validates the accuracy of uncertain evidence and contextual factors in the trust. The effectiveness of the framework is realized by applying it on various routing protocols in wireless networks. The performance evaluation confirms excellent packet delivery of the proposed hybrid framework over various networks in a highly vulnerable environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
11.
go back to reference Das, S. R., Belding-Royer, E. M., & Perkins, C. E. (2003). Ad hoc on-demand distance vector (AODV) routing, RFC3561. Das, S. R., Belding-Royer, E. M., & Perkins, C. E. (2003). Ad hoc on-demand distance vector (AODV) routing, RFC3561.
12.
go back to reference Aghera, K., Pambhar, H., & Tada, N. (2017). MMR-LEACH: Multi-tier multi-hop routing in LEACH protocol. In Proceedings of international conference on communication and networks, part of the advances in intelligent systems and computing book series (AISC, volume 508), Online ISBN: 978-981-10-2750-5, Springer, Singapore. Aghera, K., Pambhar, H., & Tada, N. (2017). MMR-LEACH: Multi-tier multi-hop routing in LEACH protocol. In Proceedings of international conference on communication and networks, part of the advances in intelligent systems and computing book series (AISC, volume 508), Online ISBN: 978-981-10-2750-5, Springer, Singapore.
16.
go back to reference Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., & Daabaj, K. (2010). Adaptive ACK: A novel intrusion detection system to mitigate intended packet dropping in MANETs. In International Arab conference on information technology (ACIT 2010) (pp. 634–640). Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., & Daabaj, K. (2010). Adaptive ACK: A novel intrusion detection system to mitigate intended packet dropping in MANETs. In International Arab conference on information technology (ACIT 2010) (pp. 634–640).
33.
go back to reference Mayzaud, A., Badonnel, R., & Chrisment, I. (2016). A taxonomy of attacks in RPL-based internet of things. International Journal of Network Security, 18(3), 459–473. Mayzaud, A., Badonnel, R., & Chrisment, I. (2016). A taxonomy of attacks in RPL-based internet of things. International Journal of Network Security, 18(3), 459–473.
41.
go back to reference Jangir, S. K., & Hemrajani, N. (2016). Evaluation of black hole, wormhole and sybil attacks in mobile ad hoc networks. In Proceedings of the second international conference on information and communication technology for competitive strategies (p. 74), ACM. https://doi.org/10.1145/2905055.2905133. Jangir, S. K., & Hemrajani, N. (2016). Evaluation of black hole, wormhole and sybil attacks in mobile ad hoc networks. In Proceedings of the second international conference on information and communication technology for competitive strategies (p. 74), ACM. https://​doi.​org/​10.​1145/​2905055.​2905133.
42.
go back to reference Balakrishnan, V., Varadharajan, V., & Tupakula, U. (2008). Subjective logic based trust model for mobile ad hoc networks. In Proceedings of the ACM 4th international conference on Security and privacy in communication networks (p. 30), https://doi.org/10.1145/1460877.1460916. Balakrishnan, V., Varadharajan, V., & Tupakula, U. (2008). Subjective logic based trust model for mobile ad hoc networks. In Proceedings of the ACM 4th international conference on Security and privacy in communication networks (p. 30), https://​doi.​org/​10.​1145/​1460877.​1460916.
44.
go back to reference Xia, H., Jia, Z., Ju, L., Li, X., & Zhu, Y. (2011). A subjective trust management model with multiple decision factors for MANET based on AHP and fuzzy logic rules. IEEE/ACM International Conference on Green Computing and Communications (GreenCom). https://doi.org/10.1109/GreenCom.2011.30. Xia, H., Jia, Z., Ju, L., Li, X., & Zhu, Y. (2011). A subjective trust management model with multiple decision factors for MANET based on AHP and fuzzy logic rules. IEEE/ACM International Conference on Green Computing and Communications (GreenCom). https://​doi.​org/​10.​1109/​GreenCom.​2011.​30.
Metadata
Title
A Dummy Packet-Based Hybrid Security Framework for Mitigating Routing Misbehavior in Multi-Hop Wireless Networks
Authors
T. Sakthivel
R. M. Chandrasekaran
Publication date
11-05-2018
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2018
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5778-2

Other articles of this Issue 3/2018

Wireless Personal Communications 3/2018 Go to the issue