Advertisement

Framework for Capturing the Intruders in Wireless Adhoc Network Using Zombie Node

  • Jyoti Neeli
  • N. K. Cauvery
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 765)

Abstract

Wireless Adhoc Network has a bigger range of application where some are already in commercial market and majority of them are still under roof of investigation. The degree of vulnerability of wireless adhoc network is quite high irrespective of presence of various existing techniques, which are too much specific to attack or orchestrated scenario of attack. Therefore, the proposed study introduces a framework that introduces a zombie node to capture the attention of attacker by advertising possession of many hops. The study also introduces broker node that is meant for balancing transmission demands along with robust security requirements. The message of zombie node is registered in hop table which makes the virtual zombie node to look like original node. An algorithm is constructed for identifying the malicious node and the study outcome is found to excel better performance with respect to the existing system.

Keywords

Wireless adhoc network Attack Intrusion Security Routing protocol Secure communication 

References

  1. 1.
    Sarkar, S.K., Basavaraju, T.G., Puttamadappa, C.: Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications, 2nd edn., p. 349. CRC Press (2016)Google Scholar
  2. 2.
    Anjum, F., Mouchtaris, P.: Security for Wireless Ad Hoc Networks, p. 316. Wiley, New York (2007)CrossRefGoogle Scholar
  3. 3.
    Bhatia, S.K., Mishra, K.K., Tiwari, S., Singh, V.K.: Advances in Computer and Computational Sciences: Proceedings of ICCCCS 2016, vol. 1, p. 775. Springer, Singapore (2017)CrossRefGoogle Scholar
  4. 4.
    Khan, S., Pathan, A.-S.K.: Wireless Networks and Security: Issues, Challenges and Research Trends, p. 512. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  5. 5.
    Rawat, D.B.: Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, p. 577. IGI Global, Hershey (2013)Google Scholar
  6. 6.
    Alcaraz, C., Lopez, J.: A security analysis for wireless sensor mesh networks in highly critical systems. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 40(4), 419–428 (2010)CrossRefGoogle Scholar
  7. 7.
    Grover, J., Sharma, S.: Security Issues in Wireless Sensor Network-A Review. IEEE Xplore (2016)Google Scholar
  8. 8.
    Alani, M.M.: MANET security: a survey. In: IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2014), Batu Ferringhi, pp. 559–564 (2014)Google Scholar
  9. 9.
    Qu, F., Wu, Z., Wang, F.Y., Cho, W.: A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16(6), 2985–2996 (2015)CrossRefGoogle Scholar
  10. 10.
    Barskar, R., Ahirwar, M., Vishwakarma, R.: Secure key management in vehicular ad-hoc network: a review. In: International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, pp. 1688–1694 (2016)Google Scholar
  11. 11.
    Wu, W., Huang, N., Sun, L., Zheng, X.: Research article measurement and analysis of MANET resilience with fault tolerance strategies. Math. Prob. Eng. 2017, 10 (2017)Google Scholar
  12. 12.
    Zamani, E., Soltanaghaei, M.: The improved overhearing backup AODV protocol in MANET. J. Comput. Netw. Commun. 2016, 8 (2016)Google Scholar
  13. 13.
    Singh, R., Singh, J., Singh, R.: WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Mob. Inf. Syst. 2016, 13 (2016)Google Scholar
  14. 14.
    Gong, P., Chen, T.M., Xu, Q.: ETARP: an energy efficient trust-aware routing protocol for wireless sensor networks. J. Sens. 2015, 10 (2015)CrossRefGoogle Scholar
  15. 15.
    Babu, M.R., Dian, S.M., Chelladurai, S., Palaniappan, M.: Proactive alleviation procedure to handle black hole attack and its version. Sci. World J. 2015, 11 (2015)CrossRefGoogle Scholar
  16. 16.
    Jain, A.K., Tokekar, V.: Mitigating the effects of black hole attacks on AODV routing protocol in mobile ad hoc networks. In: International Conference on Pervasive Computing (ICPC), Pune, pp. 1–6 (2015)Google Scholar
  17. 17.
    Gupta, A., Rana, K.: Assessment of various attacks on AODV in malicious environment. In: 1st International Conference on Next Generation Computing Technologies (NGCT), Dehradun, pp. 153–157 (2015)Google Scholar
  18. 18.
    Madhusudhanan, B., Chitra, S., Rajan, C.: Mobility based key management technique for multicast security in mobile ad hoc networks. Sci. World J. 2015, 10 (2015)CrossRefGoogle Scholar
  19. 19.
    Wu, W.-C., Liaw, H.-T.: A study on high secure and efficient MANET routing scheme. J. Sens. 2015, 10 (2015)Google Scholar
  20. 20.
    Chen, H., Chen, W., Wang, Z., Wang, Z., Li, Y.: Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014, 10 (2014)Google Scholar
  21. 21.
    Choi, H.-K., Kim, I.-H., Yoo, J.-C.: Secure and efficient protocol for vehicular ad hoc network with privacy preservation. EURASIP J. Wirel. Commun. Netw. 2011, 15 (2011)CrossRefGoogle Scholar
  22. 22.
    Chuang, M.C., Lee, J.F.: TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 8(3), 749–758 (2014)CrossRefGoogle Scholar
  23. 23.
    Li, W., Yi, P., Wu, Y., Pan, L., Li, J.: A new intrusion detection system based on KNN classification algorithm in wireless sensor network. J. Electr. Comput. Eng. 2014, 8 (2014)Google Scholar
  24. 24.
    Sekaran, R., Parasuraman, G.K.: A secure 3-way routing protocols for intermittently connected mobile ad hoc networks. Sci. World J. 2014, 13 (2014)CrossRefGoogle Scholar
  25. 25.
    Varshney, T., Sharma, T., Sharma, P.: Implementation of watchdog protocol with AODV in mobile ad hoc network. In: Fourth International Conference on Communication Systems and Network Technologies, Bhopal, pp. 217–221 (2014)Google Scholar
  26. 26.
    Yuan, W.: An anonymous routing protocol with authenticated key establishment in wireless ad hoc networks. Int. J. Distrib. Sens. Netw. 2014, 10 (2014)Google Scholar
  27. 27.
    Vasserman, E.Y., Hopper, N.: Vampire attacks: draining life from wireless ad hoc sensor networks. IEEE Trans. Mob. Comput. 12(2), 318–332 (2013)CrossRefGoogle Scholar
  28. 28.
    Wang, B., Chen, X., Chang, W.: An efficient trust-based opportunistic routing for ad hoc networks. In: International Conference on Wireless Communications and Signal Processing (WCSP), Huangshan, pp. 1–7 (2012)Google Scholar
  29. 29.
    Gonzalez, J.M., Anwar, M., Joshi, J.B.D.: Trust-based approaches to solve routing issues in ad-hoc wireless networks: a survey. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, pp. 556–563 (2011)Google Scholar
  30. 30.
    Neeli, J., Cauvery, N.K.: Insight to research progress on secure routing in wireless ad hoc network. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 8(6), 68–76 (2017)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Information Science and EngineeringGlobal Academy of TechnologyBengaluruIndia
  2. 2.Department of Information Science and EngineeringRV College of EngineeringBengaluruIndia

Personalised recommendations