A model of data forwarding in MANETs for lightweight detection of malicious packet dropping

被引:27
|
作者
Sanchez-Casado, Leovigildo [1 ]
Macia-Fernandez, Gabriel [1 ]
Garcia-Teodoro, Pedro [1 ]
Magan-Carrion, Roberto [1 ]
机构
[1] Univ Granada, Dept Signal Theory Telemat & Commun, Sch Comp Sci & Telecommun, CITIC UGR, E-18071 Granada, Spain
关键词
IDS; Malicious node; MANET; Packet dropping attacks; BLACK-HOLE ATTACKS; AD HOC NETWORKS; INTRUSION DETECTION; ROUTING PROTOCOLS;
D O I
10.1016/j.comnet.2015.05.012
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work introduces a model of data forwarding in MANETs which is used for recognizing malicious packet dropping behaviors. First, different legitimate packet discard situations are modeled, such as those generated by collisions, channel errors or mobility related droppings. Second, we propose an anomaly-based IDS system based on an enhanced windowing method to carry out the collection and analysis of selected cross-layer features. Third, a real deployment of the IDS is also considered by suggesting a methodology for the collection of the selected features in a distributed manner. We evaluate our proposal in a simulation framework and the experimental results show a considerable enhancement in detection results when compared with other approaches in the literature. For instance, our scheme shows a 22% improvement in terms of true positives rate and a remarkable 83% improvement in terms of false positives rate when compared to previous well-known statistical solutions. Finally, it is notable the simplicity and lightweightness of the proposal. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:44 / 58
页数:15
相关论文
共 50 条
  • [21] Blockchain incentivized data forwarding in MANETs: Strategies and challenges
    Machado, Caciano
    Westphall, Carla Merkle
    AD HOC NETWORKS, 2021, 110
  • [22] A Novel Technique to Detect Malicious Packet Dropping Attacks in Wireless Sensor Networks
    Terence, J. Sebastian
    Purushothaman, Geethanjali
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (01): : 203 - 216
  • [23] A Greedy and Neighbor Aware Data Forwarding Protocol in Named Data MANETs
    Cui, Bo
    Li, Ru
    2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 934 - 939
  • [24] Predicting Model for Identifying the Malicious Activity of Nodes in MANETs
    Silva, A. A. A.
    Pontes, Elvis
    Guelfi, A. E.
    Caproni, I.
    Aguiar, R.
    Zhou, F.
    Kofuji, S. T.
    2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 700 - 707
  • [25] MANET-Rank: A Framework for Defence Protocols against Packet Dropping Attacks in MANETs
    Hutchins, Charles
    Aniello, Leonardo
    Gerding, Enrico
    Halak, Basel
    PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [26] Detection of Packet Dropping and Replay Attacks in MANET
    Nagendranath, M. V. S. S.
    Babu, Ramesh A.
    Aneesha, V
    2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 933 - 938
  • [27] Proactive Source Routing Protocol for Opportunistic Data Forwarding in MANETs
    Mule, Rashmi
    Patil, Bharati
    2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 227 - 232
  • [28] HLA SIGNATURE AND ENTROPY BASED METHOD TO DETECT MALICIOUS PACKET DROPPING ATTACK IN WANET
    Mohan, Megha Vasu
    Mohan, Megha Vasu
    Vernekar, Nagaraj K.
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 847 - 851
  • [29] LOMCF: Forwarding and Caching in Named Data Networking Based MANETs
    Rehman, Rana Asif
    Kim, Byung-Seo
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (10) : 9350 - 9364
  • [30] Multiphase Detection and Evaluation of AODV for Malicious Behaviour of a node in MANETs
    Deepthi, V. S.
    Vagdevi, S.
    2018 3RD INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT - 2018), 2018, : 919 - 923