Secure routing in mobile Ad hoc networks: a predictive approach

被引:21
作者
Desai A.M. [1 ]
Jhaveri R.H. [2 ]
机构
[1] Department of Information Technology, Shri S’ad Vidya Mandal Institute Of Technology, Bharuch, Surat
[2] Department of Computer Engineering, SVM Institute of Technology, Bharuch
关键词
Mobile Ad hoc networks; Proactive scheme; Secure routing; Sequence number attacks;
D O I
10.1007/s41870-018-0188-y
中图分类号
学科分类号
摘要
In recent years, wireless technologies have gained enormous popularity and used vastly in a variety of applications. Mobile Ad hoc Networks (MANETs) are temporary networks which are built for specific purposes; they do not require any pre-established infrastructure. The dynamic nature of these networks makes them more utilizable in ubiquitous computing. These autonomous systems of wireless mobile nodes can be set up anywhere and anytime. However, due to high mobility, absence of centralized authority and open media nature, MANETs are more vulnerable to various security threats. As a result, they are prone to more security issues as compared to the traditional networks. Ad hoc networks are highly susceptible to various types of attacks. Sequence number attacks are such hazardous attacks which greatly diminish the performance of the network in different scenarios. Sequence number attacks suck some or all data packets and discard them. In past few years, various researchers proposed different solutions for detecting the sequence number attacks. In this paper, first we review notable works done by various researchers to detect sequence number attacks. The review thoroughly presents distinct aspects of the proposed approach. In addition, we propose a proactive predictive approach to mitigate sequence number attacks which discovers misbehaving nodes during route discovery phase. The proposed approach suggests modifications in Ad hoc on-demand distance vector (AODV) routing protocol. © 2018, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:345 / 356
页数:11
相关论文
共 32 条
  • [1] Li W., Joshi A., Security Issues in Mobile Ad Hoc Networks-A Survey, pp. 1-23, (2008)
  • [2] Patel P.P., Jhaveri R.H., Various schemes to detect selfishness in wireless ad-hoc networks: a survey, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 881-886, (2015)
  • [3] Pathan A.S.K., Security of self-organizing networks: MANET, WSN, WMN, VANET, (2016)
  • [4] Kannhavong B., Nakayama H., Nemoto Y., Kato N., Jamalipour A., A survey of routing attacks in mobile ad hoc networks, IEEE Wirel Commun, 14, 5, (2007)
  • [5] Luo J., Fan M., Ye D., Black hole attack prevention based on authentication mechanism, Communication Systems, 2008. ICCS 2008. 11Th IEEE Singapore International Conference on IEEE, pp. 173-177, (2008)
  • [6] Chlamtac I., Conti M., Liu J.J., Mobile ad hoc networking: imperatives and challenges, Ad Hoc Netw, 1, 1, pp. 13-64, (2003)
  • [7] Venkanna U., Velusamy R.L., Black hole attack and their counter measure based on trust management in manet: A survey, 3Rd International Conference on Advances in Recent Technologies in Communication and Computing (Artcom 2011, pp. 232-236, (2011)
  • [8] Zolfaghari M., Sadeghzadeh M., Frouzande R., Emami A., Methods for detection and removal of grayhole attack in mobile adhoc network (MANET), American Journal of Software Engineering and Applications. Special Issue: Advances in Computer Science and Information Technology in Developing Countries, 5, 3-1, pp. 15-19, (2016)
  • [9] Dwivedi V., Ahmad S., Detection and prevention methods of black hole & gray hole attacks in MANET—a critical survey, ACEIT Conference Proceeding, (2016)
  • [10] Jhaveri R.H., Patel N.M., A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks, Wirel Netw, 21, 8, pp. 2781-2798, (2015)