Beyond Watchdog Schemes in Securing MANET's Reactive Protocols Operating on a Dynamic Transmission Power Control Technique

被引:0
作者
Ochola, E. O. [1 ]
Eloff, M. M. [2 ]
van der Poll, J. A. [3 ]
机构
[1] Univ South Africa, Sch Comp, Florida, South Africa
[2] Univ South Africa, Inst Corp Citizenship, Pretoria, South Africa
[3] Univ South Africa, Grad Sch Business Leadership, Midrand, South Africa
来源
PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI) | 2016年
关键词
MANET; security; black-hole; routing; watchdog; power-aware;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Communication is no longer restricted to areas with telecommunication network infrastructure due to the introduction of wireless mobile Ad-hoc Network (MANET) that makes it possible to communicate anytime anywhere, without the support of a pre-existing network infrastructure. Unfortunately, MANET comes with unique features which are neither common to the conventional wired networks nor the cellular wireless networks, hence it presents new security challenges due to malicious attacks vulnerabilities. The operation of MANET routing protocols require that participating nodes cooperate in order to achieve the desired efficiency in information exchange in such a temporal network. The portability and size of MANET devices limit the battery power, and this has led to the implementations of various transmission power-aware schemes in the traditional MANET reactive routing protocols to prolong the network's lifetime. The introduction of the power-aware schemes makes it unreliable to solely depend on the watchdog security mechanisms to secure MANETs against black-hole attacks. This paper presents a framework which overcomes the watchdog schemes weakness in the presence of power-aware routing protocols to accurately detect and eliminate black-hole nodes, thereby improving the network performance.
引用
收藏
页码:637 / 643
页数:7
相关论文
共 21 条
[1]  
Agarwal R., 2009, International Journal on Computer Science and Engineering, V1, P98
[2]  
Agrawal Sudhir, 2011, J COMPUTING, V3
[3]  
[Anonymous], INT J APPL INFORM SY
[4]  
Basagni S., 2004, MOBILE AD HOC NETWOR
[5]  
Bo Yang, 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT), P394
[6]   Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges [J].
Djahel, Soufiene ;
Nait-Abdesselam, Farid ;
Zhang, Zonghua .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04) :658-672
[7]   An acknowledgment-based scheme to defend against cooperative black hole attacks in optimized link state routing protocol [J].
Djahel, Soufine ;
Nait-Abdesselam, Farid ;
Khokhar, Ashfaq .
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, :2780-2785
[8]  
Garg C., 2013, ASIAN J COMPUTER SCI, V3, P9
[9]  
Joshi P., 2013, INT J SCI ENG TECHNO, V2, P314
[10]  
Manoj B., 2004, AD HOC WIRELESS NETW