372 research outputs found

    Identifying time measurement tampering in the traversal time and hop count analysis (TTHCA) wormhole detection algorithm

    Get PDF
    Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets during the route discovery process and then delivering the measurements to the source node. In a participation mode (PM) wormhole where malicious nodes appear in the routing tables as legitimate nodes, the time measurements can potentially be altered so preventing TTHCA from successfully detecting the wormhole. This paper analyses the prevailing conditions for time tampering attacks to succeed for PM wormholes, before introducing an extension to the TTHCA detection algorithm called ∆T Vector which is designed to identify time tampering, while preserving low false positive rates. Simulation results confirm that the ∆T Vector extension is able to effectively detect time tampered MANET attacks, thereby providing an important security enhancement to the TTHCA algorithm

    A Comprehensive Survey on Routing and Security in Mobile Wireless Sensor Networks

    Get PDF
    With the continuous advances in mobile wirelesssensor networks (MWSNs), the research community hasresponded to the challenges and constraints in the design of thesenetworks by proposing efficient routing protocols that focus onparticular performance metrics such as residual energy utilization,mobility, topology, scalability, localization, data collection routing,Quality of Service (QoS), etc. In addition, the introduction ofmobility in WSN has brought new challenges for the routing,stability, security, and reliability of WSNs. Therefore, in thisarticle, we present a comprehensive and meticulous investigationin the routing protocols and security challenges in the theory ofMWSNs which was developed in recent years

    Securing IoT Attacks: A Machine Learning Approach for Developing Lightweight Trust-Based Intrusion Detection System

    Get PDF
    The routing process in the Internet of Things (IoT) presents challenges in industrial applications due to its complexity, involving multiple devices, critical decision-making, and accurate data transmission. The complexity further increases with dynamic IoT devices, which creates opportunities for potential intruders to disrupt routing. Traditional security measures are inadequate for IoT devices with limited battery capabilities. Although RPL (Routing Protocol for Low Energy and Lossy Networks) is commonly used for IoT routing, it remains vulnerable to security threats. This study aims to detect and isolate three routing attacks on RPL: Rank, Sybil, and Wormhole. To achieve this, a lightweight trust-based secured routing system is proposed, utilizing machine learning techniques to derive values for devices in new networks, where initial trust values are unavailable. The system demonstrates successful detection and isolation of attacks, achieving an accuracy of 98.59%, precision of 98%, recall of 99%, and f-score of 98%, thereby reinforcing its effectiveness. Attacker nodes are identified and promptly disabled, ensuring a secure routing environment. Validation on a generated dataset further confirms the reliability of the system

    Security and Dynamic Encryption System in Mobile Ad-Hoc Network

    Get PDF

    Security Issues in Manet and Counter-Measures

    Get PDF
    Mobile Ad-hoc Networks (MANET) are self-configuring networks of mobile nodes connected by wireless links. These nodes are able to move randomly and organize themselves and thus, the network's wireless architecture change rapidly and unpredictably. MANETs are usually utilized in situations of emergency for temporary operations or when there are no resources to set up elaborate networks. Mobile Ad-hoc Networks operate in the absence of any fixed infrastructure, which makes them easy to deploy, at the same time however, due to the absence of any fixed infrastructure, it becomes difficult to make use of the existing routing techniques for network services, and this poses a number of challenges in ensuring the security of the communication network, something that is not easily done as many of the demands of network security conflict with the demands of mobile networks due to the nature of the mobile devices (e.g. low power consumption, low processing load). Most of the ad-hoc routing protocols that address security issues rely on implicit trust relationships to route packets among participating nodes. Apart from security objectives like authentication, availability, confidentiality, and integrity, the ad-hoc routing protocols should also address location confidentiality, cooperation fairness and absence of traffic diversion. In this paper we attempt to survey security issues faced by the mobile ad-hoc network environment and provide a classification of the various security mechanisms. We also analyzed the respective strengths and vulnerabilities of the existing routing protocols and proposed a broad and comprehensive frame-work that can provide a tangible solution
    • …
    corecore