Malicious node prevention and mitigation in MANETs using a hybrid security model

被引:3
|
作者
Naveena, Ambidi [1 ]
Reddy, Katta Rama Linga [1 ]
机构
[1] G Narayanamma Inst Technol & Sci, Dept Elect & Telemat, Hyderabad, Telangana, India
来源
INFORMATION SECURITY JOURNAL | 2018年 / 27卷 / 02期
关键词
Anonymity; ECC; hash functions; mitigation; pseudonymity; trapdoor function;
D O I
10.1080/19393555.2017.1415399
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad-hoc network (MANET) has got tremendous success and attention due to its self-maintenance and self-configuration properties or behavior. Based on wired and wireless networks, the network topology of MANETs changes rapidly by means of routing attacks. Hence, providing security to this infrastructure-less network is a major issue. The routing protocols for ad-hoc networks cope well with the dynamically changing topology but are not designed to accommodate defense against malicious attacker. Malicious nodes have opportunities to modify or discard routing information or advertise fake routes to attract user data to go through themselves. In this article, we discuss a hybrid technique using anonymity, one-way trapdoor protocol, hash functions, and elliptic curve cryptographic to mitigate attacks in the MANET. The simulation is carried on NS-2 and the simulation results are dissected on different system execution measurements, for example, packet send and received, packet dropped, average network throughput, end-to-end delay, and packet delivery ratio.
引用
收藏
页码:92 / 101
页数:10
相关论文
共 50 条
  • [1] Malicious node analysis in MANETS
    Jamal T.
    Butt S.A.
    International Journal of Information Technology, 2019, 11 (4) : 859 - 867
  • [2] Malicious node and malicious observer node detection system in MANETs
    Durga Devi, Saravanan
    Rukmani Devi, Dhamotharan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (03):
  • [3] Hybrid Cryptography for Malicious Behavior Detection and Prevention System for MANETs
    Jathe, Shreyas S.
    Dhamdhere, Vidya
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1108 - 1114
  • [4] Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens
    Chandrakant, N.
    Shenoy, P. Deepa
    Venugopal, K. R.
    Patnaik, L. M.
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 441 - +
  • [5] An Adaptive Security Model for Dynamic Node Behaviour in MANETs
    Anand, Anjali
    Rani, Rinkle
    Aggarwal, Himanshu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (06): : 2861 - 2880
  • [6] A Game Theory Approach for Malicious Node Detection in MANETs
    Taheri, Yaser
    Garakani, Hossein Gharaee
    Mohammadzadeh, Naser
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (03) : 559 - 573
  • [7] Multiphase Detection and Evaluation of AODV for Malicious Behaviour of a node in MANETs
    Deepthi, V. S.
    Vagdevi, S.
    2018 3RD INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT - 2018), 2018, : 919 - 923
  • [8] Cluster-based multiple malicious node detection using honeypot-AODV in MANETs
    Sampada, H. K.
    Shobha, K. R.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2024, 30 (01) : 1 - 29
  • [9] A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using CORP
    Telikcherla, Krishna Chaitanya
    Agrawall, Akash
    Choppella, Venkatesh
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 516 - 523
  • [10] Environment-adaptive Malicious Node Detection in MANETs with Ensemble Learning
    Gao, Boqi
    Maekawa, Takuya
    Amagata, Daichi
    Hara, Takahiro
    2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, : 556 - 566