Skip to main content
Top
Published in: Mobile Networks and Applications 1/2019

02-01-2019

Smaclad: Secure Mobile Agent Based Cross Layer Attack Detection and Mitigation in Wireless Network

Authors: S. Nithya, C. Gomathy

Published in: Mobile Networks and Applications | Issue 1/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Threats in wireless network are common these days and when it comes to security threats their consequences are countless. Some of the most commonly witnessed security threats are route manipulation and jamming. There are several researches that are proposed to even more enhance the efficiency of these attacks against their counterfeit. The recently proposed and the most challenging threat is the cross-layer attack. Though we have solutions for single-layer attacks there are very few or no satisfactory methods to detect and counter-attack the cross-layer attacks. With this as the main goal for this paper we proposed a novel framework that secures the wireless network from cross-layer attacks. This proposal concentrates on both detecting and mitigating the attack. The former one is based on Bayesian learning detecting scheme and the later on is constructed to enhance security and performance of the network. The composed protocol is tested on a framework with cross layer attack that utilizes jamming.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Miao J, Hu Z, Yang K, Wang C, Tian H (2012) Joint Power and Bandwidth Allocation Algorithm with QoS Support in Heterogeneous Wireless Networks. IEEE Communications Letters, 16(4), 1089–7798/12$31.00_c2011 IEEE Miao J, Hu Z, Yang K, Wang C, Tian H (2012) Joint Power and Bandwidth Allocation Algorithm with QoS Support in Heterogeneous Wireless Networks. IEEE Communications Letters, 16(4), 1089–7798/12$31.00_c2011 IEEE
3.
go back to reference Jie Z, Jiandong L, Qin L, Hua S, Xiaoniu Y (2014) On minimizing delay with probabilistic splitting of traffic flow in heterogeneous wireless networks. Communications System Design, China Communications Jie Z, Jiandong L, Qin L, Hua S, Xiaoniu Y (2014) On minimizing delay with probabilistic splitting of traffic flow in heterogeneous wireless networks. Communications System Design, China Communications
4.
go back to reference Zhang Q, Zhang Y-Q (2008) Cross-layer design for qos support in multihop wireless networks. Proceedings of the IEEE 96(1), 0018–9219/$25.00 _2007 IEEE Zhang Q, Zhang Y-Q (2008) Cross-layer design for qos support in multihop wireless networks. Proceedings of the IEEE 96(1), 0018–9219/$25.00 _2007 IEEE
8.
go back to reference Meng W, Li W, Su C, Zhou J, Lu R (2018) enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. Received October 1, 2017, accepted October 28, 2017, date of publication November 13, 2017, date of current version March 9, 2018 Meng W, Li W, Su C, Zhou J, Lu R (2018) enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. Received October 1, 2017, accepted October 28, 2017, date of publication November 13, 2017, date of current version March 9, 2018
9.
go back to reference Guan Y, Ge X (2017) Distributed attack detection and secure estimationof networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Transactions on Signal and Information Processing Over Networks Guan Y, Ge X (2017) Distributed attack detection and secure estimationof networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Transactions on Signal and Information Processing Over Networks
10.
go back to reference Guo H, Yang Z, Zhang L, Zhu J, Zou Y (2017) Joint cooperative beamforming and jamming for physical-layer security of decode-and-forward relay networks. Received August 11, 2017, accepted September 4, 2017, date of publication September 14, 2017, date of current version October 12, 2017 Guo H, Yang Z, Zhang L, Zhu J, Zou Y (2017) Joint cooperative beamforming and jamming for physical-layer security of decode-and-forward relay networks. Received August 11, 2017, accepted September 4, 2017, date of publication September 14, 2017, date of current version October 12, 2017
12.
go back to reference Yi C-W (2009) Unified analytic framework based on minimum scan statistics for wireless Ad Hoc and sensor networks. IEEE Transactions on Parallel and Distributed Systems 20(9), 1045–9219/09/$25.00 _ 2009 IEEE Yi C-W (2009) Unified analytic framework based on minimum scan statistics for wireless Ad Hoc and sensor networks. IEEE Transactions on Parallel and Distributed Systems 20(9), 1045–9219/09/$25.00 _ 2009 IEEE
13.
go back to reference Fang D, Qian Y, Hu RQ (2017) Security for 5G Mobile Wireless Networks. Department of Electrical and Computer Engineering, University of Nebraska–Lincoln, Omaha, 2169–3536, IEEE Fang D, Qian Y, Hu RQ (2017) Security for 5G Mobile Wireless Networks. Department of Electrical and Computer Engineering, University of Nebraska–Lincoln, Omaha, 2169–3536, IEEE
14.
Metadata
Title
Smaclad: Secure Mobile Agent Based Cross Layer Attack Detection and Mitigation in Wireless Network
Authors
S. Nithya
C. Gomathy
Publication date
02-01-2019
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 1/2019
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-018-1201-1

Other articles of this Issue 1/2019

Mobile Networks and Applications 1/2019 Go to the issue