Skip to main content
Log in

Mitigating combinatorial attacks in node to node communication using high level security measures based on analysis of efficiency factor through regression and deviation

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

In this contemporary world, mobile ad-hoc networks emerges as an imperative field in computer science. An application of MANET is vehicular networks (VANET) which gives its maximum coverage towards real time actions like vehicular traffic control etc. A mobile ad-hoc network is a network where nodes are movable in state, infrastructure-less, self-configuring and self-repairing from the disconnected links between the nodes. The network topology changes according to the nodes’ factors. Due to lack of monitoring, any node can join the network topology based on RF level or distance coverage. Any unauthorised node enters the network and involves in communication without any legalized acceptance from the network. In case of any unusual entry of the node will results in degrade in the network efficiency factors. Anyhow it will ruin the entire network performance and makes to split the topology which causes overhead to start from the initial process. In this paper, we combined one or more attacks by deploying one or more suspicious nodes into the network. By analysing the results from simulation various performance factors are compared based on several test cases. An authorised agent node is placed in the network and issues secret key value to the mobile nodes. Analysis form the results are calculated using regression and deviation method. This paper also gives the analysis of various combinatorial ways of deployed attacks in the network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Pitchai, R., Jayashri, S., Raja, J.: Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. J. Wirel. Pers. Commun 90(2), 947–960 (2016)

    Article  Google Scholar 

  2. Kaur, N., Kad, S.: A review on security related aspects in vehicular adhoc networks. Procedia Comput. Sci. 78, 387–394 (2016)

    Article  Google Scholar 

  3. Ghate, P.V., Pati, H.K.: Collaborative distributed communication in heterogeneous environments: a comprehensive survey. J. Netw. Comput. Appl. 61, 1–20 (2016)

    Article  Google Scholar 

  4. Peng, M., et al.: Black hole search in computer networks: State-of-the-art, challenges and future directions. J. Parallel Distrib. Comput. 88, 1–15 (2016)

    Article  Google Scholar 

  5. Arora, S.K., Monga, H.: Performance evaluation of MANET on the basis of knowledge base algorithm. Optik Int. J. Light Electron Opt. 127(18), 7283–7291 (2016)

    Article  Google Scholar 

  6. Xia, H., et al.: Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096–2114 (2013)

    Article  Google Scholar 

  7. Kushwaha, A., et al.: A novel selective encryption method for securing text over mobile ad hoc network. Procedia Comput. Sci. 79, 16–23 (2016)

    Article  Google Scholar 

  8. Joshi, P., et al.: Security issues in routing protocols in MANETs at network layer. Procedia Comput. Sci. 3, 954–960 (2011)

    Article  Google Scholar 

  9. Sarika, S.: Security issues in mobile ad-hoc networks. Procedia Comput. Sci. 92, 329–335 (2016)

    Article  Google Scholar 

  10. Moltchanov, D., et al.: Distance distributions in random networks. Ad Hoc Netw. 10(6), 1146–1166 (2012)

    Article  Google Scholar 

  11. Di Pietro, R., Guarino, S., Verde, N.V., Domingo-Ferrer, J.: Security in wireless ad-hoc networks—a survey. Comput. Commun. 51, 1–20 (2014)

    Article  Google Scholar 

  12. Veerarajan, T.: Probability, Statistics and Random Processes with Queueing Theory and Queueing Networks, 4th edn. McGraw-Hill, New York (2008)

    Google Scholar 

  13. Shi, B., Wang, P., Jiang, J., Liu, R.: Applying high-frequency surrogate measurements and a wavelet-ANN model to provide early warnings of rapid surface water quality anomalies. Sci. Total Environ. 610, 1390–1399 (2018)

    Article  Google Scholar 

  14. Gasser, C., Bucher, C.: An optimized strategy for using asymptotic sampling for reliability analysis. Struct. Saf. 71, 33–40 (2018)

    Article  Google Scholar 

  15. Zhang, Y.-J., Sun, Y.-F., Huang, J.: Energy efficiency, carbon emission performance, and technology gaps: evidence from CDM project investment. Energy Policy 115, 119–130 (2018)

    Article  Google Scholar 

  16. Dhaka, A.: Gray and black hole attack identification using control packets in MANETs. Procedia Comput. Sci. 54, 83–91 (2015)

    Article  Google Scholar 

  17. Chavan, A.A.: Performance analysis of AODV and DSDV routing protocol in MANET and modifications in AODV against black hole attack. Procedia Comput. Sci. 79, 835–844 (2016)

    Article  MathSciNet  Google Scholar 

  18. Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11, 38–47 (2004)

    Article  Google Scholar 

  19. Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. J. Ad hoc Netw. 6, 32–46 (2008)

    Article  Google Scholar 

  20. Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Commun. Mag. 40, 70–75 (2002)

    Article  Google Scholar 

  21. Liu, A., et al.: On throughput capacity for a class of buffer-limited MANETs. Ad Hoc Netw. 37(Part 2), 354–367 (2016)

    Article  Google Scholar 

  22. Rajkumar, B., Narsimha, G.: Trust based certificate revocation for secure routing in MANET. Procedia Comput. Sci. 92, 431–441 (2016)

    Article  Google Scholar 

  23. Cho, J.-H., et al.: Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Netw. 44, 58–75 (2016)

    Article  Google Scholar 

  24. Conti, M., et al.: From MANET to people-centric networking: milestones and open research challenges. Comput. Commun. 71, 1–21 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. M. Gayathri.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gayathri, V.M., Nedunchelian, R. Mitigating combinatorial attacks in node to node communication using high level security measures based on analysis of efficiency factor through regression and deviation. Cluster Comput 22 (Suppl 1), 165–176 (2019). https://doi.org/10.1007/s10586-018-2004-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2004-7

Keywords

Navigation