Secure routing in mobile Ad hoc networks: a predictive approach

被引:21
作者
Desai A.M. [1 ]
Jhaveri R.H. [2 ]
机构
[1] Department of Information Technology, Shri S’ad Vidya Mandal Institute Of Technology, Bharuch, Surat
[2] Department of Computer Engineering, SVM Institute of Technology, Bharuch
关键词
Mobile Ad hoc networks; Proactive scheme; Secure routing; Sequence number attacks;
D O I
10.1007/s41870-018-0188-y
中图分类号
学科分类号
摘要
In recent years, wireless technologies have gained enormous popularity and used vastly in a variety of applications. Mobile Ad hoc Networks (MANETs) are temporary networks which are built for specific purposes; they do not require any pre-established infrastructure. The dynamic nature of these networks makes them more utilizable in ubiquitous computing. These autonomous systems of wireless mobile nodes can be set up anywhere and anytime. However, due to high mobility, absence of centralized authority and open media nature, MANETs are more vulnerable to various security threats. As a result, they are prone to more security issues as compared to the traditional networks. Ad hoc networks are highly susceptible to various types of attacks. Sequence number attacks are such hazardous attacks which greatly diminish the performance of the network in different scenarios. Sequence number attacks suck some or all data packets and discard them. In past few years, various researchers proposed different solutions for detecting the sequence number attacks. In this paper, first we review notable works done by various researchers to detect sequence number attacks. The review thoroughly presents distinct aspects of the proposed approach. In addition, we propose a proactive predictive approach to mitigate sequence number attacks which discovers misbehaving nodes during route discovery phase. The proposed approach suggests modifications in Ad hoc on-demand distance vector (AODV) routing protocol. © 2018, Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:345 / 356
页数:11
相关论文
共 32 条
[11]  
Jhaveri R.H., Narendra M.P., Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks, Int J Commun Sys, 30, 7, (2017)
[12]  
Sengathir J., Manoharan R., Exponential reliability coefficient based reputation mechanism for isolating selfish nodes in MANETs, Egypt Inform J, 16, 2, pp. 231-241, (2015)
[13]  
Alheeti K.M.A., Gruebler A., Mcdonald-Maier K., Using discriminant analysis to detect intrusions in external communication of self-driving vehicles, Digital Commun Netw, 3, 3, pp. 180-187, (2017)
[14]  
Poongodi M., Bose S., Detection and prevention system towards the truth of convergence on decision using Aumann agreement theorem, Procedia–Procedia Comput Sci, 50, pp. 244-251, (2015)
[15]  
Dhananjayan G., Subbiah J., T2AR: trust-aware ad-hoc routing protocol for MANET, Springerplus, 5, 1, (2016)
[16]  
Wang X., Yang J., Li Z., Li H., The energy-efficient group key management protocol for strategic mobile scenario of MANETs, EURASIP J Wirel Commun Netw, 2014, 1, (2014)
[17]  
Subbaraj S., Savarimuthu P., EigenTrust-based non-cooperative game model assisting ACO look-ahead secure routing against selfishness, EURASIP J Wirel Commun Netw, 2014, 1, (2014)
[18]  
Muthuramalingam S., Suba Nachiar T., Enhancing the security for manet by identifying untrusted nodes using uncertainity rules, Indian J Sci Technol, 9, 4, (2016)
[19]  
Singh O., Singh J., Singh R., An intelligent intrusion detection and prevention system for safeguard mobile adhoc networks against malicious nodes, Indian J Sci Technol, 10, 14, (2017)
[20]  
Gundluru N., Pradeep Reddy C.H., Soft-computing based trust management framework for group key management in MANETs, Int J Intell Eng Sys, 10, pp. 327-336, (2017)