A model of data forwarding in MANETs for lightweight detection of malicious packet dropping

被引:27
|
作者
Sanchez-Casado, Leovigildo [1 ]
Macia-Fernandez, Gabriel [1 ]
Garcia-Teodoro, Pedro [1 ]
Magan-Carrion, Roberto [1 ]
机构
[1] Univ Granada, Dept Signal Theory Telemat & Commun, Sch Comp Sci & Telecommun, CITIC UGR, E-18071 Granada, Spain
关键词
IDS; Malicious node; MANET; Packet dropping attacks; BLACK-HOLE ATTACKS; AD HOC NETWORKS; INTRUSION DETECTION; ROUTING PROTOCOLS;
D O I
10.1016/j.comnet.2015.05.012
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work introduces a model of data forwarding in MANETs which is used for recognizing malicious packet dropping behaviors. First, different legitimate packet discard situations are modeled, such as those generated by collisions, channel errors or mobility related droppings. Second, we propose an anomaly-based IDS system based on an enhanced windowing method to carry out the collection and analysis of selected cross-layer features. Third, a real deployment of the IDS is also considered by suggesting a methodology for the collection of the selected features in a distributed manner. We evaluate our proposal in a simulation framework and the experimental results show a considerable enhancement in detection results when compared with other approaches in the literature. For instance, our scheme shows a 22% improvement in terms of true positives rate and a remarkable 83% improvement in terms of false positives rate when compared to previous well-known statistical solutions. Finally, it is notable the simplicity and lightweightness of the proposal. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:44 / 58
页数:15
相关论文
共 50 条
  • [1] Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack
    Kukreja, Deepika
    Dhurandher, S. K.
    Reddy, B. V. R.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 941 - 956
  • [2] Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack
    Deepika Kukreja
    S. K. Dhurandher
    B. V. R. Reddy
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 941 - 956
  • [3] Detection and Isolation of Packet Dropping Attacker in MANETs
    Abdalla, Ahmed Mohamed
    Almazeed, Ahmad H.
    Saroit, Imane Aly
    Kotb, Amira
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (04) : 29 - 34
  • [4] A Reliable Solution against Packet Dropping Attack due to Malicious Nodes Using Fuzzy Logic in MANETs
    Chaudhary, Alka
    Tiwari, V. N.
    Kumar, Anil
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 178 - 181
  • [5] A Game Theoretic Malicious Nodes Detection Model in MANETs
    Wang, Xiao
    Feng, Renjian
    Wu, Yinfeng
    Che, Shenyun
    Ren, Yongji
    [J]. 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS): WORKSHOPS, 2012,
  • [6] Detection of malicious packet dropping attacks in RPL-based internet of things
    Shin, Sooyeon
    Kim, Kyounghoon
    Kwon, Taekyoung
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2019, 31 (02) : 133 - 141
  • [7] Analyzing Packet Forwarding Schemes for Selfish Behavior in MANETs
    Raza, Asad
    Al-Karaki, Jamal Nazzal
    Abbas, Haider
    [J]. INFORMATION TECHNOLOGY: NEW GENERATIONS, 2016, 448 : 227 - 236
  • [8] LPV: Lightweight Packet Forwarding Verification in SDN
    Wang, Shou-Yi
    Li, Qi
    Zhang, Yun
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (01): : 176 - 189
  • [9] Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks
    Sonekar, Shrikant V.
    Kshirsagar, Manali M.
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 317 - 328
  • [10] Resisting malicious packet dropping in wireless ad hoc networks
    Just, M
    Kranakis, E
    Wan, T
    [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2003, 2865 : 151 - 163