Malicious node prevention and mitigation in MANETs using a hybrid security model

被引:3
|
作者
Naveena, Ambidi [1 ]
Reddy, Katta Rama Linga [1 ]
机构
[1] G Narayanamma Inst Technol & Sci, Dept Elect & Telemat, Hyderabad, Telangana, India
来源
INFORMATION SECURITY JOURNAL | 2018年 / 27卷 / 02期
关键词
Anonymity; ECC; hash functions; mitigation; pseudonymity; trapdoor function;
D O I
10.1080/19393555.2017.1415399
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad-hoc network (MANET) has got tremendous success and attention due to its self-maintenance and self-configuration properties or behavior. Based on wired and wireless networks, the network topology of MANETs changes rapidly by means of routing attacks. Hence, providing security to this infrastructure-less network is a major issue. The routing protocols for ad-hoc networks cope well with the dynamically changing topology but are not designed to accommodate defense against malicious attacker. Malicious nodes have opportunities to modify or discard routing information or advertise fake routes to attract user data to go through themselves. In this article, we discuss a hybrid technique using anonymity, one-way trapdoor protocol, hash functions, and elliptic curve cryptographic to mitigate attacks in the MANET. The simulation is carried on NS-2 and the simulation results are dissected on different system execution measurements, for example, packet send and received, packet dropped, average network throughput, end-to-end delay, and packet delivery ratio.
引用
收藏
页码:92 / 101
页数:10
相关论文
共 50 条
  • [11] Optimal solution for malicious node detection and prevention using hybrid chaotic particle dragonfly swarm algorithm in VANETs
    Prabakeran, S.
    Sethukarasi, T.
    WIRELESS NETWORKS, 2020, 26 (08) : 5897 - 5917
  • [12] Optimal solution for malicious node detection and prevention using hybrid chaotic particle dragonfly swarm algorithm in VANETs
    S. Prabakeran
    T. Sethukarasi
    Wireless Networks, 2020, 26 : 5897 - 5917
  • [13] Predicting Model for Identifying the Malicious Activity of Nodes in MANETs
    Silva, A. A. A.
    Pontes, Elvis
    Guelfi, A. E.
    Caproni, I.
    Aguiar, R.
    Zhou, F.
    Kofuji, S. T.
    2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 700 - 707
  • [14] A Game Theoretic Malicious Nodes Detection Model in MANETs
    Wang, Xiao
    Feng, Renjian
    Wu, Yinfeng
    Che, Shenyun
    Ren, Yongji
    2012 IEEE 9TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS): WORKSHOPS, 2012,
  • [15] Top-k Query Processing and Malicious Node Identification Based on Node Grouping in MANETs
    Tsuda, Takuji
    Komai, Yuka
    Hara, Takahiro
    Nishio, Shojiro
    IEEE ACCESS, 2016, 4 : 993 - 1007
  • [16] A security framework to safeguard the hybrid model of SDN from malicious applications
    Mansoor, C. M.
    Kumar, K. V. Manoj
    EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY FOR SOCIETY, ENERGY AND ENVIRONMENT, 2018, : 825 - 828
  • [17] A Cooperative Black Hole Node Detection and Mitigation Approach for MANETs
    Kumar, Vimal
    Kumar, Rakesh
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, 2015, 9522 : 171 - 183
  • [18] PPN: Prime Product Number based Malicious Node Detection Scheme for MANETs
    Gambhir, Sapna
    Sharma, Saurabh
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 335 - 340
  • [19] Mitigation and performance evaluation Mechanism for Selfish Node Attack in MANETs
    Pai, Karthik B. H.
    Nagesh, H. R.
    Chiplunkar, Niranjan N.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [20] Augmenting Vehicular Ad Hoc Network Security and Efficiency with Blockchain: A Probabilistic Identification and Malicious Node Mitigation Strategy
    Juarez, Ruben
    Bordel, Borja
    ELECTRONICS, 2023, 12 (23)