A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs

被引:0
|
作者
Jhaveri, Rutvij H. [1 ]
Desai, Aneri [2 ]
Patel, Ankit [2 ]
Zhong, Yubin [3 ]
机构
[1] Nanyang Technol Univ, Delta NTU Corp Lab, Singapore 639798, Singapore
[2] SVM Inst Technol, Bharuch 392001, India
[3] Guangzhou Univ, Guangzhou 510006, Guangdong, Peoples R China
关键词
HOC; NETWORKS; PRIVACY; SECURE;
D O I
10.1155/2018/210207
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The characteristics of MANET such as decentralized architecture, dynamic topologies make MANETs susceptible to various security attacks. Sequence number attacks are such type of security threats which tend to degrade the network functioning and performance by sending fabricated route reply packets (RREP) with the objective of getting involved in the route and drop some or all of the data packets during the data transmission phase. The sequence number adversary attempts to send a fabricated high destination number in the RREP packet which attracts the sender to establish a path through the adversary node. This paper proposes a proactive secure routing mechanism which is an improvement over the authors previously proposed scheme. It makes use of linear regression mechanism to predict the maximum destination sequence number that the neighboring node can insert in the RREP packet. As an additional security checkpoint, it uses a bait detection mechanism to establish confidence in marking a suspicious node as a malicious node. The proposed approach works in collaboration with the ad hoc on-demand distance vector routing (AODV) protocol. The simulation results depict that the approach improves the network performance in the presence of adversaries as compared to previously proposed scheme.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Detection of sequence number attacks using enhanced AODV protocol in MANETs
    Eltahlawy, Ahmed M.
    Aslan, Heba K.
    Elsayed, Mahmoud Said
    Jurcut, Anca D.
    Azer, Marianne A.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [2] A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks
    Jhaveri, Rutvij H.
    Patel, Narendra M.
    [J]. WIRELESS NETWORKS, 2015, 21 (08) : 2781 - 2798
  • [3] A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks
    Rutvij H. Jhaveri
    Narendra M. Patel
    [J]. Wireless Networks, 2015, 21 : 2781 - 2798
  • [4] SRSN: Secure Routing based on Sequence Number for MANETs
    Zhou, Jieying
    Chen, Junwei
    Hu, Huiping
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 1569 - 1572
  • [5] Securing Blackhole Attacks in MANETs using Modified Sequence Number in AODV Routing Protocol
    Shrestha, Sijan
    Baidya, Ranjai
    Giri, Bivek
    Thapa, Anup
    [J]. 2020 8TH INTERNATIONAL ELECTRICAL ENGINEERING CONGRESS (IEECON), 2020,
  • [6] Cooperative Bait Detection Scheme in MANETs
    Devasthali, Anita Carolene Sandeep
    Kadam, Sujata
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 679 - 682
  • [7] Defending Collaborative Attacks in Manets Using Modified Cooperative Bait Detection Scheme
    Emimajuliet, P.
    Thirilogasundari, V
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [8] EPPN: Extended Prime Product Number based Wormhole Detection Scheme for MANETs
    Sharma, Saurabh
    Sharma, R. M.
    [J]. PROCEEDINGS OF 2017 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2017), 2017, : 251 - 254
  • [9] PPN: Prime Product Number based Malicious Node Detection Scheme for MANETs
    Gambhir, Sapna
    Sharma, Saurabh
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 335 - 340
  • [10] Novel Sequence Number Based Secure Authentication Scheme for Wireless LANs
    Rajeev Singh
    Teek Parval Sharma
    [J]. Journal of Electronic Science and Technology, 2015, (02) : 144 - 152