Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack

被引:23
|
作者
Kukreja, Deepika [1 ]
Dhurandher, S. K. [1 ]
Reddy, B. V. R. [2 ]
机构
[1] Univ Delhi, Div Informat Technol, NSIT, Delhi, India
[2] Guru Gobind Singh Indraprastha Univ, USICT, Delhi, India
关键词
Mobile ad hoc networks; Intrusion detection system; Packet forwarding misbehavior; Power aware; Dynamic source routing protocol; Security; INTRUSION DETECTION; HOC; PREVENTION; PROTOCOL;
D O I
10.1007/s12652-017-0496-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A power aware detection procedure for securing mobile ad hoc networks (MANETs) against packet forwarding misbehavior attack is introduced. Packet forwarding misbehavior attack is one of the security attacks in which malicious nodes make MANETs weak by showing packet dropping misconduct. The proposed protocol is named as power aware malicious detection for security (PAMDS) protocol. The feature of power aware is desirable to prolong MANET lifetime as under certain conditions, it is impracticable to replace or recharge the nodes' batteries. The protocol employs intrusion detection system (IDS) for the detection and exclusion of the nodes inducing packet forwarding misbehavior attack in the network. The detection procedure reacts quickly in detecting and isolating malicious nodes. The detection procedure is power aware as only a small set of nodes that have enough energy and that cover the entire network are selected for running IDS. Also, IDS nodes are not required to work in promiscuous listening mode 100% of the time, this further saves power. PAMDS protocol emphasizes on security of the mobile ad hoc environment and power saving of the battery powered hand held devices. The protocol has been extensively simulated using network simulator NS-2. The findings indicate that PAMDS protocol is effective in terms of power saving, quick malicious node isolation and packet delivery ratio percentage.
引用
收藏
页码:941 / 956
页数:16
相关论文
共 50 条
  • [1] Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack
    Deepika Kukreja
    S. K. Dhurandher
    B. V. R. Reddy
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 941 - 956
  • [2] A model of data forwarding in MANETs for lightweight detection of malicious packet dropping
    Sanchez-Casado, Leovigildo
    Macia-Fernandez, Gabriel
    Garcia-Teodoro, Pedro
    Magan-Carrion, Roberto
    [J]. COMPUTER NETWORKS, 2015, 87 : 44 - 58
  • [3] A Reliable Solution against Packet Dropping Attack due to Malicious Nodes Using Fuzzy Logic in MANETs
    Chaudhary, Alka
    Tiwari, V. N.
    Kumar, Anil
    [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 178 - 181
  • [4] A New Acknowledgment-based Scheme Against Malicious Nodes and Collusion Attack in MANETs
    Heydari, Vahid
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 784 - 788
  • [5] Misbehavior Nodes Detection and Isolation for MANETs OLSR Protocol
    Abdalla, Ahmed M.
    Saroit, Imane A.
    Kotb, Amira
    Afsari, Ali H.
    [J]. WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3
  • [6] Securing TORA against Sybil Attack in MANETs
    Thawani, Suraj
    Upadhyay, Hardik
    [J]. 2015 1ST INTERNATIONAL CONFERENCE ON FUTURISTIC TRENDS ON COMPUTATIONAL ANALYSIS AND KNOWLEDGE MANAGEMENT (ABLAZE), 2015, : 475 - 478
  • [7] Packet Forwarding Misbehavior Detection in Next-Generation Networks
    Desai, Vikram
    Natarajan, Sriram
    Wolf, Tilman
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [8] A Game Theoretic Malicious Nodes Detection Model in MANETs
    Wang, Xiao
    Feng, Renjian
    Wu, Yinfeng
    Che, Shenyun
    Ren, Yongji
    [J]. 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS): WORKSHOPS, 2012,
  • [9] Defensive Against Collaborative Attacks By Malicious Nodes In Manets: A Cooperative Bait Detection Approach
    Deny, J.
    Sundarajan, M.
    Kumar, A. Sivanesh
    Khanna, V.
    [J]. 2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [10] Detection of malicious nodes in NDN VANET for Interest Packet Popple Broadcast Diffusion Attack
    Zhang, Xin
    Li, Ru
    Zhao, Wenbo
    Wu, Rina
    [J]. PROCEEDINGS OF 2017 11TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2017, : 114 - 118