Malicious node prevention and mitigation in MANETs using a hybrid security model

被引:3
|
作者
Naveena, Ambidi [1 ]
Reddy, Katta Rama Linga [1 ]
机构
[1] G Narayanamma Inst Technol & Sci, Dept Elect & Telemat, Hyderabad, Telangana, India
来源
INFORMATION SECURITY JOURNAL | 2018年 / 27卷 / 02期
关键词
Anonymity; ECC; hash functions; mitigation; pseudonymity; trapdoor function;
D O I
10.1080/19393555.2017.1415399
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad-hoc network (MANET) has got tremendous success and attention due to its self-maintenance and self-configuration properties or behavior. Based on wired and wireless networks, the network topology of MANETs changes rapidly by means of routing attacks. Hence, providing security to this infrastructure-less network is a major issue. The routing protocols for ad-hoc networks cope well with the dynamically changing topology but are not designed to accommodate defense against malicious attacker. Malicious nodes have opportunities to modify or discard routing information or advertise fake routes to attract user data to go through themselves. In this article, we discuss a hybrid technique using anonymity, one-way trapdoor protocol, hash functions, and elliptic curve cryptographic to mitigate attacks in the MANET. The simulation is carried on NS-2 and the simulation results are dissected on different system execution measurements, for example, packet send and received, packet dropped, average network throughput, end-to-end delay, and packet delivery ratio.
引用
收藏
页码:92 / 101
页数:10
相关论文
共 50 条
  • [21] PDA-Misbehaving Node Detection & Prevention for MANETs
    Prasannavenkatesan, T.
    Raja, R.
    Ganeshkumar, P.
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [22] Grey Model and Polynomial Regression for Identifying Malicious Nodes in MANETs
    Silva, Anderson A. A.
    Pontes, Elvis
    Zhou, Fen
    Kofuji, Sergio Takeo
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 162 - 168
  • [23] SECURITY AND QOS INTEGRATION MODEL FOR MANETS
    Cizmar, Anton
    Papaj, Jan
    Dobos, Lubomir
    COMPUTING AND INFORMATICS, 2012, 31 (05) : 1025 - 1044
  • [24] A Malicious Node Detection Model for Wireless Sensor Networks Security Based on CHSA-MNDA
    Guo, Yongan
    Tang, Xinyu
    Sun, Hongbo
    2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, : 860 - 865
  • [25] Security on MANETs Using Block Coding
    Ahmad, Syed Jalal
    Krishna, P. Radha
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2054 - 2060
  • [26] A model of data forwarding in MANETs for lightweight detection of malicious packet dropping
    Sanchez-Casado, Leovigildo
    Macia-Fernandez, Gabriel
    Garcia-Teodoro, Pedro
    Magan-Carrion, Roberto
    COMPUTER NETWORKS, 2015, 87 : 44 - 58
  • [27] A Security Framework Method Based on Harmony Search Algorithm to Prevent Malicious Nodes Attacks in MANETs
    Fahad, Ahmed Mohammed
    Alani, Sameer
    ADVANCED SCIENCE LETTERS, 2017, 23 (06) : 5217 - 5221
  • [28] Mitigation of DoS Attacks by Using Multiple Encryptions in MANETs
    Singh, Ajay Vikram
    Chattopadhyaya, Moushumi
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [29] Enhancing the Security of MANETs Using Hash Algorithms
    Ravilla, Dilli
    Putta, Chandra Shekar Reddy
    ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 : 196 - 206
  • [30] A Node Control Model for the Charging and Accounting Problem in MANETs
    Kofman, Inna
    Uyen Trang Nguyen
    Hoang Lan Nguyen
    2012 THIRD FTRA INTERNATIONAL CONFERENCE ON MOBILE, UBIQUITOUS, AND INTELLIGENT COMPUTING (MUSIC), 2012, : 188 - 194