A Cross-Layer based Hidden Marko(C-HMM) Model for Detection and Prevention of Malicious Attacks in Wireless Ad-hoc Networks

被引:0
|
作者
Jagadeesan, S. [1 ]
Manjula, R. [2 ]
Johnpeter, T. [3 ]
机构
[1] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci &, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] SRM Inst Sci & Technol, Dept Comp Technol, Coll Engn & Technol, Chennai, Tamil Nadu, India
[3] K Ramakrishnan Coll Engn, Dept Comp Sci & Engn, Trichy, India
来源
2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC) | 2021年
关键词
blackhole attack; wormhole attack; machine learning; cross-layer; hidden marko model;
D O I
10.1109/ICMNWC52512.2021.9688414
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless mobile ad-hoc network is a self-configuring network which is used several mobile nodes. Mobile nodes are hop to hop communication between the nodes. In recent years' malicious attacks (blackhole and wormhole attack) have a serious thread in wireless communication. Blackhole attack and wormhole attack consume more energy, computing resource, network behaviour. In this paper a novel Cross-layer based Hidden Marko model(C-HMM) is proposed to detect and isolating a blackhole and wormhole attacks with high performance and less communication cost in wireless ad-hoc networks. The proposed algorithm C-HMM beats HMM in terms of packet loss ratio, delay, packet received and PDR. Experimental results are comparing with various parameters with help of ns2.34 simulation software.
引用
收藏
页数:5
相关论文
共 44 条
  • [21] A novel Cross-layer Quality-of-Service Model for Mobile Ad Hoc Networks
    Wang, Leichun
    Chen, Shihong
    Xiao, Kun
    Hu, Ruimin
    DCABES 2006 PROCEEDINGS, VOLS 1 AND 2, 2006, : 592 - 596
  • [22] A Novel Cross-layer Protocol based on Link Contention Sensing for Ad Hoc Networks
    Chen Qing-hua
    Xu Zi-ping
    Shen Yue-hong
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3165 - +
  • [23] A Cross-Layer Based Enhanced Handover Scheme Design in Vehicular Ad Hoc Networks
    Sehlabaka, Nkoko S.
    Kogeda, Okuthe P.
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2013, VOL II, 2013, Ao, : 701 - 706
  • [24] A cross-layer protocol for exploiting cooperative diversity in multi-hop wireless ad hoc networks
    Wu, Qilin
    Zhou, Xianzhong
    Ge, Fangzhen
    WIRELESS NETWORKS, 2017, 23 (05) : 1591 - 1610
  • [25] A cross-layer protocol for exploiting cooperative diversity in multi-hop wireless ad hoc networks
    Qilin Wu
    Xianzhong Zhou
    Fangzhen Ge
    Wireless Networks, 2017, 23 : 1591 - 1610
  • [26] Efficient service discovery schemes in wireless ad hoc networks implementing cross-layer system design
    Atanasovski, V
    Gavrilovska, L
    ITI 2005: Proceedings of the 27th International Conference on Information Technology Interfaces, 2005, : 527 - 532
  • [27] A Physical Layer Security-based Routing Protocol in Mobile Ad-hoc Wireless Networks
    Shim, Kyusung
    Tri Nhu Do
    Beongku An
    2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 417 - 422
  • [28] Enhanced adaptive cross-layer scheme for low latency HEVC streaming over Vehicular Ad-hoc Networks (VANETs)
    Labiod, Mohamed Aymen
    Gharbi, Mohamed
    Coudoux, Francois-Xavier
    Corlay, Patrick
    Doghmane, Noureddine
    VEHICULAR COMMUNICATIONS, 2019, 15 : 28 - 39
  • [29] Cross-layer scheme for low latency multiple description video streaming over Vehicular Ad-hoc NETworks (VANETs)
    Labiod, Mohamed Aymen
    Gharbi, Mohamed
    Coudoux, Francois-Xavier
    Corlay, Patrick
    Doghmane, Noureddine
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2019, 104 : 23 - 34
  • [30] Cross-layering between physical layer, medium access control, and routing in wireless ad-hoc networks
    Dricot, Jean-Michel
    Ferrari, Gianluigi
    De Doncker, Philippe
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 9 (03) : 159 - 170