Skip to main content
Erschienen in: Wireless Personal Communications 4/2018

21.05.2018

FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks

verfasst von: Sunil Kumar, Kamlesh Dutta, Anjani Garg

Erschienen in: Wireless Personal Communications | Ausgabe 4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

TCP and UDP are considered the most popular and well known transport layer protocols to facilitate the end to end communication between two nodes in the network. TCP is used as the transport layer protocol in packet delivery and error sensitive applications, where packet loss cannot be compromised. However, low-rate TCP targeted Denial of Service (DoS) attacks exploit the retransmission timeout and congestion control features of TCP protocol. These low-rate TCP targeted Denial of Service (DoS) attacks are also called JellyFish (JF) attacks. These attacks perform the malicious activities either by delaying, or periodically dropping or mis-ordering the data packets on the route from source to destination node in the network, and cause severe degradation in end-to-end throughput in the network. JellyFish attack is further classified as JF-Delay Variance Attack, JF-Periodic Drop Attack and JF-Reorder Attack based on the type of the malicious activities being performed. JellyFish attack conforms to all existing routing and packet forwarding protocol specifications, and therefore it becomes very difficult to detect its presence in the network. In this paper, a Friendship Based JellyFish Attack Detection Algorithm (FJADA) is presented for Mobile Ad Hoc Networks, where the basic concept of friendship mechanism is added to the existing Direct Trust-based Detection (DTD) algorithm to save the valuable resources of a node in monitoring the activities of its one hop neighbours, through promiscuous mode. FJADA also minimizes the possibility of overestimating the malicious behaviour of innocent nodes due to radio transmission errors, network congestion or packet collisions. The results obtained throughout the simulation experiments clearly show the feasibility and effectiveness of the proposed detection algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chlamtac, I., Conti, M., & Liu, J. J. N. (2003). Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks, 1(1), 13–64.CrossRef Chlamtac, I., Conti, M., & Liu, J. J. N. (2003). Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks, 1(1), 13–64.CrossRef
2.
Zurück zum Zitat Hoebeke, J., Moerman, I., Dhoedt, B., & Demeester, P. (2004). An overview of mobile ad hoc networks: Applications and challenges. Journal - Communications Network, 3(3), 60–66. Hoebeke, J., Moerman, I., Dhoedt, B., & Demeester, P. (2004). An overview of mobile ad hoc networks: Applications and challenges. Journal - Communications Network, 3(3), 60–66.
3.
Zurück zum Zitat Kumar, S., & Dutta, K. (2016). Securing mobile ad hoc networks: Challenges and solutions. International Journal of Handheld Computing Research (IJHCR), 7(1), 26–76.CrossRef Kumar, S., & Dutta, K. (2016). Securing mobile ad hoc networks: Challenges and solutions. International Journal of Handheld Computing Research (IJHCR), 7(1), 26–76.CrossRef
4.
Zurück zum Zitat Petrovic, M., & Aboelaze, M. (2003, February). Performance of TCP/UDP under ad hoc IEEE 802.11. In Proceedings of 10th IEEE international conference on telecommunications (ICT 2003) (Vol. 1, pp. 700–708). IEEE. Petrovic, M., & Aboelaze, M. (2003, February). Performance of TCP/UDP under ad hoc IEEE 802.11. In Proceedings of 10th IEEE international conference on telecommunications (ICT 2003) (Vol. 1, pp. 700–708). IEEE.
5.
Zurück zum Zitat Aad, I., Hubaux, J. P., & Knightly, E. W. (2004, September). Denial of service resilience in ad hoc networks. In Proceedings of the 10th annual international conference on mobile computing and networking—MobiCom ‘04 (pp. 202–215). ACM. Aad, I., Hubaux, J. P., & Knightly, E. W. (2004, September). Denial of service resilience in ad hoc networks. In Proceedings of the 10th annual international conference on mobile computing and networkingMobiCom ‘04 (pp. 202–215). ACM.
6.
Zurück zum Zitat Kuzmanovic, A., & Knightly, E. W. (2006). Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE/ACM Transactions on Networking (TON), 14(4), 683–696.CrossRef Kuzmanovic, A., & Knightly, E. W. (2006). Low-rate TCP-targeted denial of service attacks and counter strategies. IEEE/ACM Transactions on Networking (TON), 14(4), 683–696.CrossRef
7.
Zurück zum Zitat Aad, I., Hubaux, J. P., & Knightly, E. W. (2008). Impact of denial of service attacks on ad hoc networks. IEEE/ACM Transactions on Networking, 16(4), 791–802.CrossRef Aad, I., Hubaux, J. P., & Knightly, E. W. (2008). Impact of denial of service attacks on ad hoc networks. IEEE/ACM Transactions on Networking, 16(4), 791–802.CrossRef
9.
Zurück zum Zitat Zapata, M. G. (2002). Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 106–107.CrossRef Zapata, M. G. (2002). Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 106–107.CrossRef
10.
Zurück zum Zitat Razak, S. A., Furnell, S., Clarke, N., & Brooke, P. (2007). Building a trusted community for mobile ad hoc networks using friend recommendation. In E. Kranakis & J. Opatrny (Eds.), Ad-hoc, mobile, and wireless networks. ADHOC-NOW 2007. Lecture Notes in Computer Science (Vol. 4686, pp. 129–141). Berlin: Springer. Razak, S. A., Furnell, S., Clarke, N., & Brooke, P. (2007). Building a trusted community for mobile ad hoc networks using friend recommendation. In E. Kranakis & J. Opatrny (Eds.), Ad-hoc, mobile, and wireless networks. ADHOC-NOW 2007. Lecture Notes in Computer Science (Vol. 4686, pp. 129–141). Berlin: Springer.
11.
Zurück zum Zitat Laxmi, V., Lal, C., Gaur, M. S., & Mehta, D. (2015). JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET. Journal of Information Security and Applications, 22, 99–112.CrossRef Laxmi, V., Lal, C., Gaur, M. S., & Mehta, D. (2015). JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET. Journal of Information Security and Applications, 22, 99–112.CrossRef
12.
Zurück zum Zitat Rodriguez-Mayol, A., & Gozalvez, J. (2014). Reputation based selfishness prevention techniques for mobile ad-hoc networks. Telecommunication Systems, 57(2), 181–195.CrossRef Rodriguez-Mayol, A., & Gozalvez, J. (2014). Reputation based selfishness prevention techniques for mobile ad-hoc networks. Telecommunication Systems, 57(2), 181–195.CrossRef
13.
Zurück zum Zitat Perkins, C. E. & Royer, E. M. (1999, February) Ad hoc on-demand distance vector routing. In Proceedings of second IEEE workshop on mobile computing systems and applications (WMCSA’99) (pp. 90–100). IEEE. Perkins, C. E. & Royer, E. M. (1999, February) Ad hoc on-demand distance vector routing. In Proceedings of second IEEE workshop on mobile computing systems and applications (WMCSA’99) (pp. 90–100). IEEE.
14.
Zurück zum Zitat Laxmi, V., Mehta, D., Gaur, M. S., & Faruki, P. (2013, November). Impact analysis of jellyfish attack on tcp-based mobile ad-hoc networks. In Proceedings of the 6th international conference on security of information and networks (pp. 189–195). ACM. Laxmi, V., Mehta, D., Gaur, M. S., & Faruki, P. (2013, November). Impact analysis of jellyfish attack on tcp-based mobile ad-hoc networks. In Proceedings of the 6th international conference on security of information and networks (pp. 189–195). ACM.
15.
Zurück zum Zitat Samad, F. (2011). Securing wireless mesh networks: a three dimensional perspective. Doctoral dissertation. RWTH Aachen University, Germany. Samad, F. (2011). Securing wireless mesh networks: a three dimensional perspective. Doctoral dissertation. RWTH Aachen University, Germany.
16.
Zurück zum Zitat Jayasingh, B. B., & Swathi, B. (2010). A novel metric for detection of JellyFish Reorder Attack on ad hoc network. BVICAM’s International Journal of Information Technology, 2(1), 164–169. Jayasingh, B. B., & Swathi, B. (2010). A novel metric for detection of JellyFish Reorder Attack on ad hoc network. BVICAM’s International Journal of Information Technology, 2(1), 164–169.
17.
Zurück zum Zitat Samad, F., Abu Ahmed, Q., Shaikh, A., & Aziz, A. (2012). JAM: Mitigating jellyfish attacks in wireless ad hoc networks. In B. S. Chowdhry, F. K. Shaikh, D. M. A. Hussain, & M. A. Uqaili (Eds.), Emerging trends and applications in information communication technologies. IMTIC 2012. Communications in computer and information science (Vol. 281, pp. 432–444). Berlin: Springer. Samad, F., Abu Ahmed, Q., Shaikh, A., & Aziz, A. (2012). JAM: Mitigating jellyfish attacks in wireless ad hoc networks. In B. S. Chowdhry, F. K. Shaikh, D. M. A. Hussain, & M. A. Uqaili (Eds.), Emerging trends and applications in information communication technologies. IMTIC 2012. Communications in computer and information science (Vol. 281, pp. 432–444). Berlin: Springer.
18.
Zurück zum Zitat Wazid, M., Katal, A., & Goudar, R. H. (2012, December). Cluster and super cluster based intrusion detection and prevention techniques for JellyFish Reorder Attack. In Proceedings of 2nd IEEE international conference on parallel, distributed and grid computing (PDGC-2012) (pp. 435–440). IEEE. Wazid, M., Katal, A., & Goudar, R. H. (2012, December). Cluster and super cluster based intrusion detection and prevention techniques for JellyFish Reorder Attack. In Proceedings of 2nd IEEE international conference on parallel, distributed and grid computing (PDGC-2012) (pp. 435–440). IEEE.
19.
Zurück zum Zitat Katal, A., Wazid, M., Goudar, R. H., & Singh, D. P. (2013, April). A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission. In Proceedings of 2013 IEEE conference on information and communication technologies (ICT) (pp. 479–484). IEEE. Katal, A., Wazid, M., Goudar, R. H., & Singh, D. P. (2013, April). A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission. In Proceedings of 2013 IEEE conference on information and communication technologies (ICT) (pp. 479–484). IEEE.
20.
Zurück zum Zitat Wazid, M., Katal, A., Sachan, R. S., & Goudar, R. H. (2013, April). E-TCP for efficient performance of MANET under JF delay variance attack. In Proceedings of 2013 IEEE conference on information and communication technologies (ICT) (pp. 145–150). IEEE. Wazid, M., Katal, A., Sachan, R. S., & Goudar, R. H. (2013, April). E-TCP for efficient performance of MANET under JF delay variance attack. In Proceedings of 2013 IEEE conference on information and communication technologies (ICT) (pp. 145–150). IEEE.
21.
Zurück zum Zitat Patel, H. P., & Chaudhari, M. B. (2013, July). A time space cryptography hashing solution for prevention JellyFish Reordering Attack in wireless ad hoc networks. In Proceedings of 2013 fourth IEEE international conference on computing, communications and networking technologies (ICCCNT) (pp. 1–6). IEEE. Patel, H. P., & Chaudhari, M. B. (2013, July). A time space cryptography hashing solution for prevention JellyFish Reordering Attack in wireless ad hoc networks. In Proceedings of 2013 fourth IEEE international conference on computing, communications and networking technologies (ICCCNT) (pp. 1–6). IEEE.
22.
Zurück zum Zitat Kumar, S., & Dutta, K. (2016). Intrusion detection in mobile ad hoc networks: Techniques, systems, and future challenges. Security and Communication Networks, 9(14), 2484–2556.CrossRef Kumar, S., & Dutta, K. (2016). Intrusion detection in mobile ad hoc networks: Techniques, systems, and future challenges. Security and Communication Networks, 9(14), 2484–2556.CrossRef
23.
Zurück zum Zitat Thomas, A., Sharma, V. K., & Singhal, G. (2015, December). Secure link establishment method to prevent jelly fish attack in MANET. In Proceedings of international conference on computational intelligence and communication networks (CICN) (pp. 1153–1158). IEEE. Thomas, A., Sharma, V. K., & Singhal, G. (2015, December). Secure link establishment method to prevent jelly fish attack in MANET. In Proceedings of international conference on computational intelligence and communication networks (CICN) (pp. 1153–1158). IEEE.
24.
Zurück zum Zitat Razak, S. A., Furnell, S. M., Clarke, N. L., & Brooke, P. J. (2008). Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks, 6(7), 1151–1167.CrossRef Razak, S. A., Furnell, S. M., Clarke, N. L., & Brooke, P. J. (2008). Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks, 6(7), 1151–1167.CrossRef
25.
Zurück zum Zitat Murata, T. (1989). Petri nets: Properties, analysis and applications. Proceedings of the IEEE, 77(4), 541–580.CrossRef Murata, T. (1989). Petri nets: Properties, analysis and applications. Proceedings of the IEEE, 77(4), 541–580.CrossRef
26.
Zurück zum Zitat Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180.CrossRef Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180.CrossRef
Metadaten
Titel
FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks
verfasst von
Sunil Kumar
Kamlesh Dutta
Anjani Garg
Publikationsdatum
21.05.2018
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5797-z

Weitere Artikel der Ausgabe 4/2018

Wireless Personal Communications 4/2018 Zur Ausgabe

Neuer Inhalt