Malicious node prevention and mitigation in MANETs using a hybrid security model

被引:3
|
作者
Naveena, Ambidi [1 ]
Reddy, Katta Rama Linga [1 ]
机构
[1] G Narayanamma Inst Technol & Sci, Dept Elect & Telemat, Hyderabad, Telangana, India
来源
INFORMATION SECURITY JOURNAL | 2018年 / 27卷 / 02期
关键词
Anonymity; ECC; hash functions; mitigation; pseudonymity; trapdoor function;
D O I
10.1080/19393555.2017.1415399
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad-hoc network (MANET) has got tremendous success and attention due to its self-maintenance and self-configuration properties or behavior. Based on wired and wireless networks, the network topology of MANETs changes rapidly by means of routing attacks. Hence, providing security to this infrastructure-less network is a major issue. The routing protocols for ad-hoc networks cope well with the dynamically changing topology but are not designed to accommodate defense against malicious attacker. Malicious nodes have opportunities to modify or discard routing information or advertise fake routes to attract user data to go through themselves. In this article, we discuss a hybrid technique using anonymity, one-way trapdoor protocol, hash functions, and elliptic curve cryptographic to mitigate attacks in the MANET. The simulation is carried on NS-2 and the simulation results are dissected on different system execution measurements, for example, packet send and received, packet dropped, average network throughput, end-to-end delay, and packet delivery ratio.
引用
收藏
页码:92 / 101
页数:10
相关论文
共 50 条
  • [31] Enhanced Security in MANETs Using AODV Protocol
    Gupta S.
    Singla S.
    Sharma P.
    Journal of The Institution of Engineers (India): Series B, 2025, 106 (1) : 327 - 338
  • [32] Hybrid ELECTRE and bipolar fuzzy PROMOTHEE-based packet dropping malicious node mitigation technique for improving QoS in WSNs
    Madhavi, S.
    Praveen, R.
    Jagatheswari, S.
    Nivitha, K.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2025, 38 (02)
  • [33] Top-k Query Processing and Malicious Node Identification against Data Replacement Attack in MANETs
    Tsuda, Takuji
    Komai, Yuka
    Sasaki, Yuya
    Hara, Takahiro
    Nishio, Shojiro
    2014 IEEE 15TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM), VOL 1, 2014, : 279 - 288
  • [34] Enhanced security to MANETs using digital codes
    Ahmad, Syed Jalal
    Unissa, Ishrath
    Ali, M. Shoukath
    Kumar, Abhay
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [35] Malicious Node Detection for the Future Network Security from Epistemic Uncertainties
    Huang, Xu
    Ahmed, Muhammad R.
    Cui, Hongyan
    Li Shutao
    2013 16TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2013,
  • [36] Security scheme for malicious node detection in mobile ad hoc networks
    Rathod, P
    Mody, N
    Gada, D
    Gogri, R
    Dedhia, Z
    Sanyal, S
    Abraham, A
    DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 541 - 542
  • [37] A hybrid model to detect malicious executables
    Masud, Mohammad M.
    Khan, Latifur
    Thuraisingham, Bhavani
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1443 - 1448
  • [38] Security against Malicious Node in the Vehicular Cloud Computing using a Software-Defined Networking Architecture
    Bousselham, Mhidi
    Abdellaoui, Abderrahim
    Chaoui, Habiba
    2017 INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND ITS ENGINEERING APPLICATIONS (ICSOFTCOMP), 2017,
  • [39] CRCMD&R: Cluster and Reputation based Cooperative Malicious Node Detection & Removal Scheme in MANETs
    Sharma, Saurabh
    Gambhir, Sapna
    PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), 2017, : 336 - 340
  • [40] Persuasive: A node isolation attack variant for OLSR-based MANETs and its mitigation
    Schweitzer, Nadav
    Cohen, Liad
    Dvir, Amit
    Stulman, Ariel
    AD HOC NETWORKS, 2023, 148