An Adaptive and Predictive Security Model for Mobile Ad hoc Networks

被引:0
|
作者
Sathishkumar Alampalayam
Anup Kumar
机构
[1] University of Louisville,Computer Engineering and Computer Science Department
来源
关键词
GloMoSim; mobile ad hoc networks; network parameters; routing attacks; selfishness;
D O I
暂无
中图分类号
学科分类号
摘要
Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without any centralized authority. These unique characteristics coupled with the growing concerns for security attacks demand an immediate solution for securing the ad hoc network, prior to its full-fledged deployment in commercial and military applications. So far, most of the research in mobile ad hoc networks has been primarily focused on routing and mobility aspects rather than securing the ad hoc networks themselves. Due to ever increasing security threats, there is a need to develop schemes, algorithms, and protocols for a secured ad hoc network infrastructure. To realize this objective, we have proposed a practical and effective security model for mobile ad hoc networks. The proposed predictive security model is designed using a fuzzy feedback control approach. The model is based on identifying critical network parameters that are affected by various types of attacks and it continuously monitors those parameters. Once we measure the relative change in these parameter values, we could detect the type of attack accurately and protect the system, without compromising its effectiveness. Experimental results of the model simulated for selected packet mistreatment attacks and routing attacks are very promising.
引用
下载
收藏
页码:263 / 281
页数:18
相关论文
共 50 条
  • [21] Adaptive routing for mobile ad hoc networks
    Hoebeke, Jeroen
    Moerman, Ingrid
    Demeester, Piet
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012,
  • [22] Security in ad hoc networks: An extension of dynamic source routing in mobile ad hoc networks
    Venkataraman, Revathi
    Pushpalatha, M.
    2006 10TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2006, : 723 - +
  • [23] Predictive models to rebroadcast in Mobile Ad hoc NETworks
    Williams, B
    Mehta, DP
    Camp, T
    Navidi, W
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2004, 3 (03) : 295 - 303
  • [24] Distributed security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 166 - 171
  • [25] Security In Multicast Mobile Ad-Hoc Networks
    Shanthi, N.
    Ganesan, L.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (07): : 326 - 330
  • [26] Layered security design for mobile ad hoc networks
    Komninos, N
    Vergados, D
    Douligeris, C
    COMPUTERS & SECURITY, 2006, 25 (02) : 121 - 130
  • [27] A Security Architecture for Tactical Mobile Ad hoc Networks
    Wang, Hengjun
    Wang, Yadi
    Han, Jihong
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 312 - 315
  • [28] SECURITY IN MULTICAST MOBILE AD-HOC NETWORKS
    Visu, P.
    Chembian, W. T.
    Koteeswaran, S.
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 38 - 44
  • [29] Security in wireless mobile Ad Hoc and sensor networks
    Guizani, Mohsen
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    Mueller, Peter
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 6 - 7
  • [30] Security in mobile ad hoc networks: Challenges and solutions
    Yang, H
    Luo, HY
    Ye, F
    Lu, SW
    Zhang, LX
    IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) : 38 - 47