Sensitivity Analysis of an Attack-Pattern Discovery Based Trusted Routing Scheme for Mobile Ad-Hoc Networks in Industrial IoT

被引:69
作者
Jhaveri, Rutvij H. [1 ]
Patel, Narendra M. [2 ]
Zhong, Yubin [3 ]
Sangaiah, Arun Kumar [4 ]
机构
[1] SVM Inst Technol, Bharuch 392001, India
[2] Birla Vishvakarma Mahavidyalaya, Vv Nagar 388120, India
[3] Guangzhou Univ, Guangzhou 510006, Guangdong, Peoples R China
[4] Vellore Inst Technol, Vellore 632014, Tamil Nadu, India
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Attack-pattern discovery; industrial Internet-of-Things; mobile ad-hoc networks; packet forwarding misbehavior; sensitivity analysis; trusted routing; FRAMEWORK; ALGORITHM; AODV;
D O I
10.1109/ACCESS.2018.2822945
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad-hoc networks (MANETs) are pervasive autonomous networks that will play a vital role in future Industrial Internet-of-Things communication, where smart devices will be connected in a completely distributed manner. However, due to lack of infrastructure and absence of centralized administration, MANETs are shrouded with various security threats. Some internal mobile nodes in these resource constrained networks may compromise the routing mechanism in order to launch denial-of-service attacks to carry out distinct kinds of packet forwarding misbehaviors. In order to address this issue, in our previous paper, we devised a trusted routing scheme with pattern discovery (TRS-PD), which identifies packet dropping adversaries in advance by monitoring and analyzing their behavior during route discovery phase. In this paper, we perform sensitivity analysis of TRS-PD which is carried out by varying values of different parameters in distinct network scenarios in the existence of three distinct packet dropping attacks. In addition, this work summarizes the attack-pattern discovery mechanism, trust model, and routing mechanism adopted by TRS-PD in order to counter the adversaries which follow certain attack patterns along with other adversaries. Experiments conducted with network simulator-2 indicate the correct choices of parameter values for distinct network scenarios.
引用
收藏
页码:20085 / 20103
页数:19
相关论文
共 34 条
  • [1] [Anonymous], 2017, SPRINGER MOBILE NETW
  • [2] Dependable Structural Health Monitoring Using Wireless Sensor Networks
    Bhuiyan, Md Zakirul Alam
    Wang, Guojun
    Wu, Jie
    Cao, Jiannong
    Liu, Xuefeng
    Wang, Tian
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (04) : 363 - 376
  • [3] Enhancing network capacity by weakening community structure in scale-free network
    Cai, Jun
    Wang, Yu
    Liu, Yan
    Luo, Jian-Zhen
    Wei, Wenguo
    Xu, Xiaoping
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 765 - 771
  • [4] Hierarchical and Shared Access Control
    Castiglione, Arcangelo
    De Santis, Alfredo
    Masucci, Barbara
    Palmieri, Francesco
    Castiglione, Aniello
    Li, Jin
    Huang, Xinyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 850 - 865
  • [5] Flexible neural trees based early stage identification for IP traffic
    Chen, Zhenxiang
    Peng, Lizhi
    Gao, Chongzhi
    Yang, Bo
    Chen, Yuehui
    Li, Jin
    [J]. SOFT COMPUTING, 2017, 21 (08) : 2035 - 2046
  • [6] DTCF: A Distributed Trust Computing Framework for Vehicular Ad hoc Networks
    Gazdar, Tahani
    Belghith, Abdelfettah
    AlMogren, Ahmad
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (03): : 1533 - 1556
  • [7] TRAS: A Trust-Based Routing Protocol for Ad Hoc and Sensor Networks
    Jawhar, Imad
    Mohammed, Farhan
    Al Jaroodi, Jameela
    Mohamed, Nader
    [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 382 - 387
  • [8] Jhaveri R. H., 2012, Proceedings of the 2012 Second International Conference on Advanced Computing & Communication Technologies (ACCT 2012), P535, DOI 10.1109/ACCT.2012.48
  • [9] Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks
    Jhaveri, Rutvij H.
    Patel, Narendra M.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (07)
  • [10] Jhaveri RH, 2016, INT J NEXT-GENER COM, V7, P130