Advertisement

Cluster Computing

, Volume 22, Supplement 1, pp 165–176 | Cite as

Mitigating combinatorial attacks in node to node communication using high level security measures based on analysis of efficiency factor through regression and deviation

  • V. M. GayathriEmail author
  • R. Nedunchelian
Article

Abstract

In this contemporary world, mobile ad-hoc networks emerges as an imperative field in computer science. An application of MANET is vehicular networks (VANET) which gives its maximum coverage towards real time actions like vehicular traffic control etc. A mobile ad-hoc network is a network where nodes are movable in state, infrastructure-less, self-configuring and self-repairing from the disconnected links between the nodes. The network topology changes according to the nodes’ factors. Due to lack of monitoring, any node can join the network topology based on RF level or distance coverage. Any unauthorised node enters the network and involves in communication without any legalized acceptance from the network. In case of any unusual entry of the node will results in degrade in the network efficiency factors. Anyhow it will ruin the entire network performance and makes to split the topology which causes overhead to start from the initial process. In this paper, we combined one or more attacks by deploying one or more suspicious nodes into the network. By analysing the results from simulation various performance factors are compared based on several test cases. An authorised agent node is placed in the network and issues secret key value to the mobile nodes. Analysis form the results are calculated using regression and deviation method. This paper also gives the analysis of various combinatorial ways of deployed attacks in the network.

Keywords

MANET VANET ANOVA Intrusion detection system Regression 

References

  1. 1.
    Pitchai, R., Jayashri, S., Raja, J.: Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. J. Wirel. Pers. Commun 90(2), 947–960 (2016)CrossRefGoogle Scholar
  2. 2.
    Kaur, N., Kad, S.: A review on security related aspects in vehicular adhoc networks. Procedia Comput. Sci. 78, 387–394 (2016)CrossRefGoogle Scholar
  3. 3.
    Ghate, P.V., Pati, H.K.: Collaborative distributed communication in heterogeneous environments: a comprehensive survey. J. Netw. Comput. Appl. 61, 1–20 (2016)CrossRefGoogle Scholar
  4. 4.
    Peng, M., et al.: Black hole search in computer networks: State-of-the-art, challenges and future directions. J. Parallel Distrib. Comput. 88, 1–15 (2016)CrossRefGoogle Scholar
  5. 5.
    Arora, S.K., Monga, H.: Performance evaluation of MANET on the basis of knowledge base algorithm. Optik Int. J. Light Electron Opt. 127(18), 7283–7291 (2016)CrossRefGoogle Scholar
  6. 6.
    Xia, H., et al.: Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096–2114 (2013)CrossRefGoogle Scholar
  7. 7.
    Kushwaha, A., et al.: A novel selective encryption method for securing text over mobile ad hoc network. Procedia Comput. Sci. 79, 16–23 (2016)CrossRefGoogle Scholar
  8. 8.
    Joshi, P., et al.: Security issues in routing protocols in MANETs at network layer. Procedia Comput. Sci. 3, 954–960 (2011)CrossRefGoogle Scholar
  9. 9.
    Sarika, S.: Security issues in mobile ad-hoc networks. Procedia Comput. Sci. 92, 329–335 (2016)CrossRefGoogle Scholar
  10. 10.
    Moltchanov, D., et al.: Distance distributions in random networks. Ad Hoc Netw. 10(6), 1146–1166 (2012)CrossRefGoogle Scholar
  11. 11.
    Di Pietro, R., Guarino, S., Verde, N.V., Domingo-Ferrer, J.: Security in wireless ad-hoc networks—a survey. Comput. Commun. 51, 1–20 (2014)CrossRefGoogle Scholar
  12. 12.
    Veerarajan, T.: Probability, Statistics and Random Processes with Queueing Theory and Queueing Networks, 4th edn. McGraw-Hill, New York (2008)Google Scholar
  13. 13.
    Shi, B., Wang, P., Jiang, J., Liu, R.: Applying high-frequency surrogate measurements and a wavelet-ANN model to provide early warnings of rapid surface water quality anomalies. Sci. Total Environ. 610, 1390–1399 (2018)CrossRefGoogle Scholar
  14. 14.
    Gasser, C., Bucher, C.: An optimized strategy for using asymptotic sampling for reliability analysis. Struct. Saf. 71, 33–40 (2018)CrossRefGoogle Scholar
  15. 15.
    Zhang, Y.-J., Sun, Y.-F., Huang, J.: Energy efficiency, carbon emission performance, and technology gaps: evidence from CDM project investment. Energy Policy 115, 119–130 (2018)CrossRefGoogle Scholar
  16. 16.
    Dhaka, A.: Gray and black hole attack identification using control packets in MANETs. Procedia Comput. Sci. 54, 83–91 (2015)CrossRefGoogle Scholar
  17. 17.
    Chavan, A.A.: Performance analysis of AODV and DSDV routing protocol in MANET and modifications in AODV against black hole attack. Procedia Comput. Sci. 79, 835–844 (2016)MathSciNetCrossRefGoogle Scholar
  18. 18.
    Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11, 38–47 (2004)CrossRefGoogle Scholar
  19. 19.
    Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. J. Ad hoc Netw. 6, 32–46 (2008)CrossRefGoogle Scholar
  20. 20.
    Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Commun. Mag. 40, 70–75 (2002)CrossRefGoogle Scholar
  21. 21.
    Liu, A., et al.: On throughput capacity for a class of buffer-limited MANETs. Ad Hoc Netw. 37(Part 2), 354–367 (2016)CrossRefGoogle Scholar
  22. 22.
    Rajkumar, B., Narsimha, G.: Trust based certificate revocation for secure routing in MANET. Procedia Comput. Sci. 92, 431–441 (2016)CrossRefGoogle Scholar
  23. 23.
    Cho, J.-H., et al.: Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Netw. 44, 58–75 (2016)CrossRefGoogle Scholar
  24. 24.
    Conti, M., et al.: From MANET to people-centric networking: milestones and open research challenges. Comput. Commun. 71, 1–21 (2015)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Saveetha UniversityChennaiIndia
  2. 2.Department of Computer Science and EngineeringSri Venkateswara College of EngineeringKancheepuramIndia

Personalised recommendations