An efficient layered security framework for protecting network layer operations in mobile ad hoc networks

被引:1
|
作者
Jaisankar, N. [1 ]
Saravanan, R. [1 ]
机构
[1] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
关键词
mobile ad hoc network; MANET; mobile agents; malicious nodes; routing; network-layer security; packet forwarding; routing protocols; truthfulness rate; public key; false alarm rate;
D O I
10.1504/IJCNDS.2010.034950
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile ad hoc networks, the nodes are dynamically changing and they have a fully decentralised topology. Hence, security is hard to achieve due to the dynamic nature of the relationships between the participating nodes as well as the vulnerabilities and limitations of the wireless transmission medium. We proposed a novel agent-based framework to monitor, detect and isolate misbehaving nodes in the MANET. The proposed framework protect both routing and data forwarding operations, which aiming to improve the efficiency in detecting and isolating misbehaving nodes with a minimum overhead. In this paper, local neighbouring nodes collaboratively monitor and sustain each other. A novel truthfulness rate strategy is introduced in each node to determine the well-behaving nodes. We evaluate through network simulations the effectiveness of the framework in detecting malicious nodes and improving the network performance.
引用
收藏
页码:295 / 307
页数:13
相关论文
共 50 条
  • [41] Security in ad hoc networks: An extension of dynamic source routing in mobile ad hoc networks
    Venkataraman, Revathi
    Pushpalatha, M.
    [J]. 2006 10TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2006, : 723 - +
  • [42] Efficient Broadcasting in Mobile Ad Hoc Networks
    Khabbazian, Majid
    Bhargava, Vijay K.
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (02) : 231 - 245
  • [43] A reliable and efficient MAC layer broadcast protocol for mobile ad hoc networks
    Chiu, Chun-Yuan
    Wu, Eric Hsiao-Kuang
    Chen, Gen-Huey
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2007, 56 (04) : 2296 - 2305
  • [44] Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network
    Su, Jian
    Liu, Huining
    [J]. APPLIED INFORMATICS AND COMMUNICATION, PT I, 2011, 224 : 233 - +
  • [45] Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network
    Su, Jian
    Liu, Huining
    [J]. 2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I, 2010, : 143 - 146
  • [46] A Survey on Network Layer Attacks and AODV Defense in Mobile Ad hoc Networks
    Saeed, Amna
    Raza, Asad
    Abbas, Haider
    [J]. 2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 185 - 191
  • [47] Network autoconfiguratton for mobile ad hoc networks
    Yi, Seung
    Meegan, Jeff
    Kim, Jae H.
    [J]. 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 121 - 127
  • [48] Security In Multicast Mobile Ad-Hoc Networks
    Shanthi, N.
    Ganesan, L.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (07): : 326 - 330
  • [49] Distributed security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 166 - 171
  • [50] Service discovery in mobile ad-hoc networks: Better at the network layer?
    Garcia-Macias, JA
    Torres, DA
    [J]. 2005 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2005, : 452 - 457