235 research outputs found
Recommended from our members
Feature Engineering for Detection of Wormhole Attacking in Mobile Ad Hoc Networks with Machine Learning Methods
Due to the self-configuring nature of a Mobile Ad Hoc Network (MANET), each node must participate in the routing process, in addition to its other activities. Therefore, routing in a MANET is especially vulnerable to malicious node activity leading to potentially severe disruption in network communications. The wormhole attack is a particularly severe MANET routing threat since it is easy to launch, can be launched in several modes, difficult to detect, and can cause significant communication disruption. In this paper we establish a practice for feature engineering of network data for wormhole attack prevention and detection with intrusion detection methods based on machine learning
A secure method to detect wormhole attack in mobile adhoc network
According to recent advances in wireless telecommunications, the performance and use of wireless technologies has increased extremely. In this study concerned on the Mobile Ad-hoc Network (MANET) is a collection of self-configuring mobile node without any infrastructure. There are different security flaws and attacks on the routing protocols in the MANET. One of the critical threats is the wormhole attacks, which have attracted a great deal of attention over the years. The wormhole attack can affect the performance of different routing protocols. During this attack, a malicious node captures packets from one location in the network, and “tunnels” them to another malicious node at a distant point, which replays them locally. This study presents a review of the most important solutions for counteracting wormhole attacks, as well as presents proposed method on DSR routing protocol for detecting them. The performance of the proposed method was examined through ns-2 simulations. Hence, the results show that proposed method can detect this serious attack in a Mobile Adhoc Network
Performance analysis of black hole and worm hole attacks in MANETs
A Mobile Ad Hoc Network MANET is composed of a freely and mobility set of mobile nodes. They form a temporary dynamic wireless network without any infrastructure. Since the nodes act as both host and router in their communication, they act as a router provide connectivity by forwarding data packets among intermediate nodes to the destination. The routing protocol is used to grove their communication and connectivity as example, the Ad On-demand distance vector (AODV) routing protocol. However, due to the lack of security vulnerabilities of routing protocols and the absence of infrastructure, MANET is vulnerable to various security threats and attacks. This paper examines the impact of two types of attacks on AODV routing protocol using Network Simulator version 2 (NS2) environment. These attacks are Blackhole and Wormhole Attacks. The aim of both of them is to prevent data packets to reach the destination node and dropping all the traffic.
A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks
Wireless Sensor Networks refers to a multi-hop packet based network that contains a set of mobile sensor nodes. Every node is free to travel separately on any route and can modify its links to other nodes. Therefore, the network is self organizing and adaptive networks which repeatedly changes its topology. The relations among nodes are restricted to their communication range, and teamwork with intermediate nodes is necessary for nodes to forward the packets to other sensor nodes beyond their communication range. The network2019;s broadcasting character and transmission medium help the attacker to interrupt network. An attacker can transform the routing protocol and interrupt the network operations through mechanisms such as selective forwarding, packet drops, and data fabrication. One of the serious routingdisruption attacks is Wormhole Attack. The main emphasis of this paper is to study wormhole attack, its detection method and the different techniques to prevent the network from these attack
ADAPTIVE SECURE AND EFFICIENT ROUTING PROTOCOL FOR ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK
Nowadays Mobile Ad Hoc Network (MANET) is an emerging area of research to provide various communication services to end users. Mobile Ad Hoc Networks (MANETs) are self-organizing wireless networks where nodes communicate with each other without a fixed infrastructure. Due to their unique characteristics, such as mobility, autonomy, and ad hoc connectivity, MANETs have become increasingly popular in various applications, including military, emergency response, and disaster management. However, the lack of infrastructure and dynamic topology of MANETs pose significant challenges to designing a secure and efficient routing protocol. This paper proposes an adaptive, secure, and efficient routing protocol that can enhance the performance of MANET. The proposed protocol incorporates various security mechanisms, including authentication, encryption, key management, and intrusion detection, to ensure secure routing. Additionally, the protocol considers energy consumption, network load, packet delivery fraction, route acquisition latency, packets dropped and Quality of Service (QoS) requirements of the applications to optimize network performance. Overall, the secure routing protocol for MANET should provide a reliable and secure communication environment that can adapt to the dynamic nature of the network. The protocol should ensure that messages are delivered securely and efficiently to the intended destination, while minimizing the risk of attacks and preserving the network resources Simulation results demonstrate that the proposed protocol outperforms existing routing protocols in terms of network performance and security. The proposed protocol can facilitate the deployment of various applications in MANET while maintaining security and efficiency
A Comprehensive Survey on Routing and Security in Mobile Wireless Sensor Networks
With the continuous advances in mobile wirelesssensor networks (MWSNs), the research community hasresponded to the challenges and constraints in the design of thesenetworks by proposing efficient routing protocols that focus onparticular performance metrics such as residual energy utilization,mobility, topology, scalability, localization, data collection routing,Quality of Service (QoS), etc. In addition, the introduction ofmobility in WSN has brought new challenges for the routing,stability, security, and reliability of WSNs. Therefore, in thisarticle, we present a comprehensive and meticulous investigationin the routing protocols and security challenges in the theory ofMWSNs which was developed in recent years
Security Issues in Manet and Counter-Measures
Mobile Ad-hoc Networks (MANET) are self-configuring networks of mobile nodes connected by wireless links. These nodes are able to move randomly and organize themselves and thus, the network's wireless architecture change rapidly and unpredictably. MANETs are usually utilized in situations of emergency for temporary operations or when there are no resources to set up elaborate networks. Mobile Ad-hoc Networks operate in the absence of any fixed infrastructure, which makes them easy to deploy, at the same time however, due to the absence of any fixed infrastructure, it becomes difficult to make use of the existing routing techniques for network services, and this poses a number of challenges in ensuring the security of the communication network, something that is not easily done as many of the demands of network security conflict with the demands of mobile networks due to the nature of the mobile devices (e.g. low power consumption, low processing load). Most of the ad-hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes. Apart from security objectives like authentication, availability, confidentiality, and integrity, the ad-hoc routing protocols should also address location confidentiality, cooperation fairness and absence of traffic diversion. In this paper we attempt to survey security issues faced by the mobile ad-hoc network environment and provide a classification of the various security mechanisms. We also analyzed the respective strengths and vulnerabilities of the existing routing protocols and proposed a broad and comprehensive frame-work that can provide a tangible solution
Safe Routing Approach by Identifying and Subsequently Eliminating the Attacks in MANET
Wireless networks that are decentralized and communicate without using
existing infrastructure are known as mobile ad-hoc networks. The most common
sorts of threats and attacks can affect MANETs. Therefore, it is advised to
utilize intrusion detection, which controls the system to detect additional
security issues. Monitoring is essential to avoid attacks and provide extra
protection against unauthorized access. Although the current solutions have
been designed to defeat the attack nodes, they still require additional
hardware, have considerable delivery delays, do not offer high throughput or
packet delivery ratios, or do not do so without using more energy. The
capability of a mobile node to forward packets, which is dependent on the
platform's life quality, may be impacted by the absence of the network node
power source. We developed the Safe Routing Approach (SRA), which uses
behaviour analysis to track and monitor attackers who discard packets during
the route discovery process. The attacking node recognition system is made for
irregular routing node detection to protect the controller network's usual
properties from becoming recognized as an attack node. The suggested method
examines the nearby attack nodes and conceals the trusted node in the routing
pathway. The path is instantly assigned after the initial discovery of trust
nodes based on each node's strength value. It extends the network's life span
and reduces packet loss. In terms of Packet Delivery Ratio (PDR), energy
consumption, network performance, and detection of attack nodes, the suggested
approach is contrasted with AIS, ZIDS, and Improved AODV. The findings
demonstrate that the recommended strategy performs superior in terms of PDR,
residual energy, and network throughput
- …