Advertisement

Mobile Networks and Applications

, Volume 24, Issue 1, pp 259–270 | Cite as

Smaclad: Secure Mobile Agent Based Cross Layer Attack Detection and Mitigation in Wireless Network

  • S. NithyaEmail author
  • C. Gomathy
Article
  • 49 Downloads

Abstract

Threats in wireless network are common these days and when it comes to security threats their consequences are countless. Some of the most commonly witnessed security threats are route manipulation and jamming. There are several researches that are proposed to even more enhance the efficiency of these attacks against their counterfeit. The recently proposed and the most challenging threat is the cross-layer attack. Though we have solutions for single-layer attacks there are very few or no satisfactory methods to detect and counter-attack the cross-layer attacks. With this as the main goal for this paper we proposed a novel framework that secures the wireless network from cross-layer attacks. This proposal concentrates on both detecting and mitigating the attack. The former one is based on Bayesian learning detecting scheme and the later on is constructed to enhance security and performance of the network. The composed protocol is tested on a framework with cross layer attack that utilizes jamming.

Keywords

Wireless sensor networks Intrusion detection system Cross layer architecture WSN security 

References

  1. 1.
    Miao J, Hu Z, Yang K, Wang C, Tian H (2012) Joint Power and Bandwidth Allocation Algorithm with QoS Support in Heterogeneous Wireless Networks. IEEE Communications Letters, 16(4), 1089–7798/12$31.00_c2011 IEEEGoogle Scholar
  2. 2.
    Raza Bukhari SH, Rehmani MH, Siraj S (2016) A survey of channel bonding for wireless networks and guidelines of channel bonding for futuristic cognitive radio sensor networks. Communications Surveys & Tutorials,  https://doi.org/10.1109/COMST.2015.2504408, IEEE
  3. 3.
    Jie Z, Jiandong L, Qin L, Hua S, Xiaoniu Y (2014) On minimizing delay with probabilistic splitting of traffic flow in heterogeneous wireless networks. Communications System Design, China CommunicationsGoogle Scholar
  4. 4.
    Zhang Q, Zhang Y-Q (2008) Cross-layer design for qos support in multihop wireless networks. Proceedings of the IEEE 96(1), 0018–9219/$25.00 _2007 IEEEGoogle Scholar
  5. 5.
    Huang H, Gong T, Zhang R, Yang L, Zhang J, Xiao F (2018) Intrusion detection based on k-coverage in mobile sensor networks with empowered intruders. IEEE Trans Veh Technol.  https://doi.org/10.1109/TVT.2018.2872848
  6. 6.
    Zhao P, Yang X (2016) Opportunistic routing for bandwidth-sensitiven traffic in wireless networks with lossy links. Journal of Communications and Networks 18(5), Digital object identifier.  https://doi.org/10.1109/JCN.2016.000109, 1229-2370/16/$10.00 c 2016
  7. 7.
    Mashima D, Gunathilaka P, Chen B (2018) Artificial command delaying for secure substation network control: design and implementation. IEEE Transactions on Smart Grid.  https://doi.org/10.1109/TSG.2017.2744802
  8. 8.
    Meng W, Li W, Su C, Zhou J, Lu R (2018) enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. Received October 1, 2017, accepted October 28, 2017, date of publication November 13, 2017, date of current version March 9, 2018Google Scholar
  9. 9.
    Guan Y, Ge X (2017) Distributed attack detection and secure estimationof networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Transactions on Signal and Information Processing Over NetworksGoogle Scholar
  10. 10.
    Guo H, Yang Z, Zhang L, Zhu J, Zou Y (2017) Joint cooperative beamforming and jamming for physical-layer security of decode-and-forward relay networks. Received August 11, 2017, accepted September 4, 2017, date of publication September 14, 2017, date of current version October 12, 2017Google Scholar
  11. 11.
    Pan Y, Hou Y, Li M, Gerdes RM, Zeng K, Towfiq MA, Cetiner BA (2017) Message integrity protection over wireless channel: countering signal cancellation via channel randomization. IEEE Transactions on Dependable and Secure Computing.  https://doi.org/10.1109/TDSC.2017.2751600
  12. 12.
    Yi C-W (2009) Unified analytic framework based on minimum scan statistics for wireless Ad Hoc and sensor networks. IEEE Transactions on Parallel and Distributed Systems 20(9), 1045–9219/09/$25.00 _ 2009 IEEEGoogle Scholar
  13. 13.
    Fang D, Qian Y, Hu RQ (2017) Security for 5G Mobile Wireless Networks. Department of Electrical and Computer Engineering, University of Nebraska–Lincoln, Omaha, 2169–3536, IEEEGoogle Scholar
  14. 14.
    Tian F, Chen X, Liu S, Yuan X, Li D, Zhang X, Yang Z (2018) Secrecy rate optimization in wireless multi-hop full duplex networks. Special Section on Secure Modulations for Future Wireless Communications and Mobile Networks, Digital Object Identifier.  https://doi.org/10.1109/Access.2018.2794739

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.SRM Institute of Science & TechnologyChennaiIndia
  2. 2.SRM Institute of Science & TechnologyChennaiIndia

Personalised recommendations