A Cross-Layer based Hidden Marko(C-HMM) Model for Detection and Prevention of Malicious Attacks in Wireless Ad-hoc Networks

被引:0
|
作者
Jagadeesan, S. [1 ]
Manjula, R. [2 ]
Johnpeter, T. [3 ]
机构
[1] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci &, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] SRM Inst Sci & Technol, Dept Comp Technol, Coll Engn & Technol, Chennai, Tamil Nadu, India
[3] K Ramakrishnan Coll Engn, Dept Comp Sci & Engn, Trichy, India
来源
2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC) | 2021年
关键词
blackhole attack; wormhole attack; machine learning; cross-layer; hidden marko model;
D O I
10.1109/ICMNWC52512.2021.9688414
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless mobile ad-hoc network is a self-configuring network which is used several mobile nodes. Mobile nodes are hop to hop communication between the nodes. In recent years' malicious attacks (blackhole and wormhole attack) have a serious thread in wireless communication. Blackhole attack and wormhole attack consume more energy, computing resource, network behaviour. In this paper a novel Cross-layer based Hidden Marko model(C-HMM) is proposed to detect and isolating a blackhole and wormhole attacks with high performance and less communication cost in wireless ad-hoc networks. The proposed algorithm C-HMM beats HMM in terms of packet loss ratio, delay, packet received and PDR. Experimental results are comparing with various parameters with help of ns2.34 simulation software.
引用
收藏
页数:5
相关论文
共 44 条
  • [1] Innovative cross-layer defense mechanisms for blackhole and wormhole attacks in wireless ad-hoc networks
    Jagadeesan Srinivasan
    Scientific Reports, 15 (1)
  • [2] A cross-layer approach to detect jamming attacks in wireless ad hoc networks
    Thamilarasu, Geethapriya
    Mishra, Sumita
    Sridhar, Ramalingam
    MILCOM 2006, VOLS 1-7, 2006, : 2586 - +
  • [3] A Cross-layer Method for Identifying and Isolating the Blackhole Nodes in Vehicular Ad-hoc Networks
    Rabiaa, Naib
    Moussa, Ali Cherif
    Sofiane, Boukli Hacene
    INFORMATION SECURITY JOURNAL, 2023, 32 (03): : 212 - 226
  • [4] Establishment of Cross-Layer Trust Model for Ad Hoc Networks
    Bai, Yuan
    Bai, Zhongying
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1472 - +
  • [5] A Cross-Layer Adaptive Cooperative MAC Protocol for Wireless Ad Hoc Networks
    Shi, Chunguang
    Song, An
    Cheng, Wenjing
    Zhao, Haitao
    Ma, Dongtang
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [6] Cross-layer directional antenna MAC protocol for wireless ad hoc networks
    Gossain, H
    Cordeiro, C
    Joshi, T
    Agrawal, DP
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (02) : 171 - 182
  • [7] A cross-layer protocol for cooperative content delivery over mobile ad-hoc networks
    Greco, Claudio
    Cagnazzo, Marco
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2011, 7 (1-2) : 49 - 63
  • [8] A Cross-Layer Optimization Scheme for Energy-Saving MAC Protocol Based on Wireless Ad-Hoc Network
    Wang, Jun
    Zhang, Yus
    Wang, Jian
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEM (ICISS 2018), 2018, : 189 - 195
  • [9] Enhanced cross-layer based middleware for mobile ad hoc networks
    Denko, Mieso K.
    Shakshuki, Elhadi
    Malik, Haroon
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (02) : 490 - 499
  • [10] Grouped Black hole Attacks Security Model (GBHASM) for Wireless Ad-Hoc Networks
    Bajwa, Shahid Shehzad
    Khan, Muhammad Khalid
    2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 1, 2010, : 756 - 760