Skip to main content

Framework for Capturing the Intruders in Wireless Adhoc Network Using Zombie Node

  • Conference paper
  • First Online:
Cybernetics and Algorithms in Intelligent Systems (CSOC2018 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 765))

Included in the following conference series:

Abstract

Wireless Adhoc Network has a bigger range of application where some are already in commercial market and majority of them are still under roof of investigation. The degree of vulnerability of wireless adhoc network is quite high irrespective of presence of various existing techniques, which are too much specific to attack or orchestrated scenario of attack. Therefore, the proposed study introduces a framework that introduces a zombie node to capture the attention of attacker by advertising possession of many hops. The study also introduces broker node that is meant for balancing transmission demands along with robust security requirements. The message of zombie node is registered in hop table which makes the virtual zombie node to look like original node. An algorithm is constructed for identifying the malicious node and the study outcome is found to excel better performance with respect to the existing system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sarkar, S.K., Basavaraju, T.G., Puttamadappa, C.: Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications, 2nd edn., p. 349. CRC Press (2016)

    Google Scholar 

  2. Anjum, F., Mouchtaris, P.: Security for Wireless Ad Hoc Networks, p. 316. Wiley, New York (2007)

    Book  Google Scholar 

  3. Bhatia, S.K., Mishra, K.K., Tiwari, S., Singh, V.K.: Advances in Computer and Computational Sciences: Proceedings of ICCCCS 2016, vol. 1, p. 775. Springer, Singapore (2017)

    Book  Google Scholar 

  4. Khan, S., Pathan, A.-S.K.: Wireless Networks and Security: Issues, Challenges and Research Trends, p. 512. Springer, Heidelberg (2013)

    Book  Google Scholar 

  5. Rawat, D.B.: Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, p. 577. IGI Global, Hershey (2013)

    Google Scholar 

  6. Alcaraz, C., Lopez, J.: A security analysis for wireless sensor mesh networks in highly critical systems. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 40(4), 419–428 (2010)

    Article  Google Scholar 

  7. Grover, J., Sharma, S.: Security Issues in Wireless Sensor Network-A Review. IEEE Xplore (2016)

    Google Scholar 

  8. Alani, M.M.: MANET security: a survey. In: IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2014), Batu Ferringhi, pp. 559–564 (2014)

    Google Scholar 

  9. Qu, F., Wu, Z., Wang, F.Y., Cho, W.: A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16(6), 2985–2996 (2015)

    Article  Google Scholar 

  10. Barskar, R., Ahirwar, M., Vishwakarma, R.: Secure key management in vehicular ad-hoc network: a review. In: International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, pp. 1688–1694 (2016)

    Google Scholar 

  11. Wu, W., Huang, N., Sun, L., Zheng, X.: Research article measurement and analysis of MANET resilience with fault tolerance strategies. Math. Prob. Eng. 2017, 10 (2017)

    Google Scholar 

  12. Zamani, E., Soltanaghaei, M.: The improved overhearing backup AODV protocol in MANET. J. Comput. Netw. Commun. 2016, 8 (2016)

    Google Scholar 

  13. Singh, R., Singh, J., Singh, R.: WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Mob. Inf. Syst. 2016, 13 (2016)

    Google Scholar 

  14. Gong, P., Chen, T.M., Xu, Q.: ETARP: an energy efficient trust-aware routing protocol for wireless sensor networks. J. Sens. 2015, 10 (2015)

    Article  Google Scholar 

  15. Babu, M.R., Dian, S.M., Chelladurai, S., Palaniappan, M.: Proactive alleviation procedure to handle black hole attack and its version. Sci. World J. 2015, 11 (2015)

    Article  Google Scholar 

  16. Jain, A.K., Tokekar, V.: Mitigating the effects of black hole attacks on AODV routing protocol in mobile ad hoc networks. In: International Conference on Pervasive Computing (ICPC), Pune, pp. 1–6 (2015)

    Google Scholar 

  17. Gupta, A., Rana, K.: Assessment of various attacks on AODV in malicious environment. In: 1st International Conference on Next Generation Computing Technologies (NGCT), Dehradun, pp. 153–157 (2015)

    Google Scholar 

  18. Madhusudhanan, B., Chitra, S., Rajan, C.: Mobility based key management technique for multicast security in mobile ad hoc networks. Sci. World J. 2015, 10 (2015)

    Article  Google Scholar 

  19. Wu, W.-C., Liaw, H.-T.: A study on high secure and efficient MANET routing scheme. J. Sens. 2015, 10 (2015)

    Google Scholar 

  20. Chen, H., Chen, W., Wang, Z., Wang, Z., Li, Y.: Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014, 10 (2014)

    Google Scholar 

  21. Choi, H.-K., Kim, I.-H., Yoo, J.-C.: Secure and efficient protocol for vehicular ad hoc network with privacy preservation. EURASIP J. Wirel. Commun. Netw. 2011, 15 (2011)

    Article  Google Scholar 

  22. Chuang, M.C., Lee, J.F.: TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 8(3), 749–758 (2014)

    Article  Google Scholar 

  23. Li, W., Yi, P., Wu, Y., Pan, L., Li, J.: A new intrusion detection system based on KNN classification algorithm in wireless sensor network. J. Electr. Comput. Eng. 2014, 8 (2014)

    Google Scholar 

  24. Sekaran, R., Parasuraman, G.K.: A secure 3-way routing protocols for intermittently connected mobile ad hoc networks. Sci. World J. 2014, 13 (2014)

    Article  Google Scholar 

  25. Varshney, T., Sharma, T., Sharma, P.: Implementation of watchdog protocol with AODV in mobile ad hoc network. In: Fourth International Conference on Communication Systems and Network Technologies, Bhopal, pp. 217–221 (2014)

    Google Scholar 

  26. Yuan, W.: An anonymous routing protocol with authenticated key establishment in wireless ad hoc networks. Int. J. Distrib. Sens. Netw. 2014, 10 (2014)

    Google Scholar 

  27. Vasserman, E.Y., Hopper, N.: Vampire attacks: draining life from wireless ad hoc sensor networks. IEEE Trans. Mob. Comput. 12(2), 318–332 (2013)

    Article  Google Scholar 

  28. Wang, B., Chen, X., Chang, W.: An efficient trust-based opportunistic routing for ad hoc networks. In: International Conference on Wireless Communications and Signal Processing (WCSP), Huangshan, pp. 1–7 (2012)

    Google Scholar 

  29. Gonzalez, J.M., Anwar, M., Joshi, J.B.D.: Trust-based approaches to solve routing issues in ad-hoc wireless networks: a survey. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, pp. 556–563 (2011)

    Google Scholar 

  30. Neeli, J., Cauvery, N.K.: Insight to research progress on secure routing in wireless ad hoc network. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 8(6), 68–76 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jyoti Neeli .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Neeli, J., Cauvery, N.K. (2019). Framework for Capturing the Intruders in Wireless Adhoc Network Using Zombie Node. In: Silhavy, R. (eds) Cybernetics and Algorithms in Intelligent Systems . CSOC2018 2018. Advances in Intelligent Systems and Computing, vol 765. Springer, Cham. https://doi.org/10.1007/978-3-319-91192-2_34

Download citation

Publish with us

Policies and ethics