Skip to main content
Erschienen in: Wireless Personal Communications 1/2019

01.04.2019

ITCA, an IDS and Trust Solution Collaborated with ACK Based Approach to Mitigate Network Layer Attack on MANET Routing

verfasst von: Nilesh Marathe, Subhash K. Shinde

Erschienen in: Wireless Personal Communications | Ausgabe 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The feature of Dynamic topology configuration of MANET reciprocates the security constraints and bring in many security threats that hamper the routing and time bound delivery of packets. Many security schemes had been proposed to secure MANET routing and improve its efficiency. The solutions proposed by existing systems are defined in one dimension so that the targeted attack can be fixed up, but that might create flaws in other dimension or introduce new attack. So it is necessary to create a multidimensional solution that empowers the routing process to become inherently secure rather than defending one particular attack. The selfish or maliciously behaving nodes in the network are the key players in launching the attacks and disrupting the routing process. In this paper, the proposed consolidated approach named, IDS and Trust solution Collaborated with Ack based approach (ITCA), performs identification of attack, isolation of misbehaving nodes and control behavior of nodes in the network. This enables the routing process to be more robust by resisting the malicious nodes from being the part of a route, avoid attack formation and thus supports to improve the efficiency. Even though the malicious nodes are isolated, the proposed method allows them to be sender for transmitting their own data, but under controlled environment defined by IDS so that the attempt to launch DOS attack can be avoided. The reconsideration of isolated node that to under controlled IDS environment in collaboration with Trust and improved ACK based scheme is key behind proposed multidimensional method, ITCA. Further the method is integrated with AODV and extensive experimentation is done based on raising number of malicious nodes in the network to measure its effectiveness and efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gupta, R., & Jain, C. (2011). Mobile adhoc network (manets): Proposed solution to security related issues. Indian Journal of Computer Science and Engineering (IJCSE), 2(5), 738–746. Gupta, R., & Jain, C. (2011). Mobile adhoc network (manets): Proposed solution to security related issues. Indian Journal of Computer Science and Engineering (IJCSE), 2(5), 738–746.
4.
Zurück zum Zitat Gupta, K., & Gujral, M. (2013). Secure detection technique against blackhole attack for zone routing protocol in manets. International Journal of Application or Innovation in Engineering and Management (IJAIEM), 2(6), 444–448. Gupta, K., & Gujral, M. (2013). Secure detection technique against blackhole attack for zone routing protocol in manets. International Journal of Application or Innovation in Engineering and Management (IJAIEM), 2(6), 444–448.
5.
7.
11.
Zurück zum Zitat Uyyala, S., & Naik, D. (2014). Anomaly based intrusion detection of packet dropping attacks in mobile ad-hoc networks. In 2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT) (pp. 1137–1140). https://doi.org/10.1109/ICCICCT.2014.6993132. Uyyala, S., & Naik, D. (2014). Anomaly based intrusion detection of packet dropping attacks in mobile ad-hoc networks. In 2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT) (pp. 1137–1140). https://​doi.​org/​10.​1109/​ICCICCT.​2014.​6993132.
12.
Zurück zum Zitat Adhikari, S., & Setua, S. K. (2013Cooperative network intrusion detection system (CNIDS) in mobile adhoc network based on DSR protocol. In Proceedings of 2013 3rd international conference on computer science and network technology (pp. 929–935). https://doi.org/10.1109/ICCSNT.2013.6967257. Adhikari, S., & Setua, S. K. (2013Cooperative network intrusion detection system (CNIDS) in mobile adhoc network based on DSR protocol. In Proceedings of 2013 3rd international conference on computer science and network technology (pp. 929–935). https://​doi.​org/​10.​1109/​ICCSNT.​2013.​6967257.
16.
Zurück zum Zitat Sharma, A., Bhuriya, D., Singh, U., & Singh, S. (2014). Prevention of black hole attack in AODV routing algorithm of manet using trust based computing. International Journal of Computer Science and Information Technologies. Sharma, A., Bhuriya, D., Singh, U., & Singh, S. (2014). Prevention of black hole attack in AODV routing algorithm of manet using trust based computing. International Journal of Computer Science and Information Technologies.
18.
Zurück zum Zitat Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H.-M. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114. https://doi.org/10.1016/j.adhoc.2012.02.009. (Theory, algorithms and applications of wireless networked robotics recent advances in vehicular communications and networking).CrossRef Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H.-M. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114. https://​doi.​org/​10.​1016/​j.​adhoc.​2012.​02.​009. (Theory, algorithms and applications of wireless networked robotics recent advances in vehicular communications and networking).CrossRef
Metadaten
Titel
ITCA, an IDS and Trust Solution Collaborated with ACK Based Approach to Mitigate Network Layer Attack on MANET Routing
verfasst von
Nilesh Marathe
Subhash K. Shinde
Publikationsdatum
01.04.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06282-5

Weitere Artikel der Ausgabe 1/2019

Wireless Personal Communications 1/2019 Zur Ausgabe

Neuer Inhalt