An efficient layered security framework for protecting network layer operations in mobile ad hoc networks

被引:1
|
作者
Jaisankar, N. [1 ]
Saravanan, R. [1 ]
机构
[1] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
关键词
mobile ad hoc network; MANET; mobile agents; malicious nodes; routing; network-layer security; packet forwarding; routing protocols; truthfulness rate; public key; false alarm rate;
D O I
10.1504/IJCNDS.2010.034950
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile ad hoc networks, the nodes are dynamically changing and they have a fully decentralised topology. Hence, security is hard to achieve due to the dynamic nature of the relationships between the participating nodes as well as the vulnerabilities and limitations of the wireless transmission medium. We proposed a novel agent-based framework to monitor, detect and isolate misbehaving nodes in the MANET. The proposed framework protect both routing and data forwarding operations, which aiming to improve the efficiency in detecting and isolating misbehaving nodes with a minimum overhead. In this paper, local neighbouring nodes collaboratively monitor and sustain each other. A novel truthfulness rate strategy is introduced in each node to determine the well-behaving nodes. We evaluate through network simulations the effectiveness of the framework in detecting malicious nodes and improving the network performance.
引用
收藏
页码:295 / 307
页数:13
相关论文
共 50 条
  • [1] A network-layer security solution for mobile Ad hoc networks
    Pan, Jun
    Li, Jianhua
    [J]. WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 311 - 314
  • [2] Security issues at the network layer in wireless mobile ad hoc networks
    Al-Jaroodi, J
    [J]. ICWN '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2005, : 576 - 582
  • [3] Layered security design for mobile ad hoc networks
    Komninos, N
    Vergados, D
    Douligeris, C
    [J]. COMPUTERS & SECURITY, 2006, 25 (02) : 121 - 130
  • [4] Authentication in a layered security approach for mobile ad hoc networks
    Komninos, Nikos
    Vergados, Dimitrios D.
    Douligeris, Christos
    [J]. COMPUTERS & SECURITY, 2007, 26 (05) : 373 - 380
  • [5] C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks
    Dhurandher, Sanjay K.
    Woungang, Isaac
    Traore, Issa
    [J]. 2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 530 - 535
  • [6] Security Solution for Mobile Ad hoc Network of Networks (MANoN)
    Al-Bayatti, Ali H.
    Zedan, Hussein
    Cau, Antonio
    [J]. ICNS: 2009 FIFTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2009, : 255 - 262
  • [7] Security Management for Mobile Ad Hoc Network of Networks (MANoN)
    Al-Bayatti, Ali H.
    Zedan, Hussein
    Cau, Antonio
    Siewe, Francois
    [J]. INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2010, 2 (01) : 1 - 19
  • [8] Efficient Internet Access Framework for Mobile Ad Hoc Networks
    Attia, Radwa
    Rizk, Rawya
    Ali, Hesham Arafat
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (03) : 1689 - 1722
  • [9] Efficient Internet Access Framework for Mobile Ad Hoc Networks
    Radwa Attia
    Rawya Rizk
    Hesham Arafat Ali
    [J]. Wireless Personal Communications, 2015, 84 : 1689 - 1722
  • [10] Security in Mobile Ad Hoc Networks
    Khanpara, Pimal
    Trivedi, Bhushan
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 501 - 511