Skip to main content

Relation Estimation of Packets Dropped by Wormhole Attack to Packets Sent Using Regression Analysis

  • Conference paper
  • First Online:
Emerging Technology in Modelling and Graphics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 937))

Abstract

MANET is exposed to the possibility of being attacked or harmed by so many attacks like Black hole, Wormhole, Jellyfish, etc. The attacking nodes can easily set Wormhole attack by duplicating a route which is shorter than the original within network. In this paper, we estimate the pattern of relation between packets dropped to packets sent, that is packet delivery fraction (PDF) by Wormhole attack using regression analysis, a machine learning approach, by method of least square (MLS), and least absolute deviation (LAD). A comparative analysis between these two techniques is done. As there is high degree of linearity between packets sent and packets dropped by Wormhole attack, the pattern of dropped packet is proved by MLS regression and LAD regression. Accuracy is also tested. MLS and LAD regression algorithms are also developed to estimate this pattern for Wormhole attack. Wormhole attackers create a duplicate tunnel (wired link or high frequency) from source to destination. An illusion is created by this, that the distance through this tunnel from source to destination is minimal and must take less time. Comparing to this fake tunnel, the original route takes more time. So it is necessary to calculate the time taken to estimate the relation of packets dropped to packets sent by Wormhole attack. Better performance by linear regression analysis for pattern estimation of these dropped packets is proved by simulation, done by MATLAB simulator for Wormhole attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Majumder, D. Bhattacharyya, Mitigating wormhole attack in MANET using absolute deviation statistical approach, in 2018 IEEE 8th Annual, on Computing and Communication Workshop and Conference (2018), pp. 317–320

    Google Scholar 

  2. F. Xing, On the survivability of wireless ad-hoc networks with node misbehaviors and failures. Secur. Comput., IEEE Trans. On 7(3), 284–299 (2010)

    Article  Google Scholar 

  3. M.N. Alslaim, H.A. Alaqel, S.S. Zaghloul. A comparative study of MANET routing protocols, in 2014 Third International Conference on e-Technologies and Networks for Development (2014)

    Google Scholar 

  4. D.B. Roy, R. Chaki, N. Chaki, A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks. IJNSA, 44–52 (2009)

    Google Scholar 

  5. L. Qiana, N. Songa, X.F. Li, Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis approach. J. Netw. Comput. Appl. 2005

    Google Scholar 

  6. G.K. Patnaik, M.M. Gore, Trustworthy path discovery in MANET—a message oriented cross-correlation approach, in Workshops of International Conference on Advanced Information Net-working and Applications (2011), pp. 170–177

    Google Scholar 

  7. R. Jia, F. Yang, S. Yao, X. Tian, X. Wang, W. Zhang, J. Xu, Optimal capacity–delay tradeoff in MANETs with correlation of node mobility. IEEE Trans. Veh. Technol., 66(2), 1772–1785 (2017)

    Article  Google Scholar 

  8. K. Sandar Win, Analysis of detecting wormhole attack in wireless networks, Int. J. Electron. Commun. Eng., 2(12), 2704–2710 (2008)

    Google Scholar 

  9. Y. Li, G.R. Arce, A maximum likelihood approach to least absolute deviation regression. EURASIP J. Appl. Sig. Process. 2004–12, 1762–1769 (2004)

    MathSciNet  Google Scholar 

  10. R. Venkataraman, M. Pushpalatha, T. Rama Rao, Regression- based trust model for mobile ad hoc networks. IET Inf. Secur., 6(3), 131–140 (2012)

    Article  Google Scholar 

  11. F. Cadger, K. Curran, J. Santos, S. Moffett, MANET location prediction using machine learning algorithms, in International Conference on Wired/Wireless Internet Communications, (2012), pp. 174–185

    Google Scholar 

  12. S. L. Rosen, J. A. Stine and W. J. Weiland, A manet simulation tool to study algorithms for generating propagation maps, in Proceedings of the 2006 Winter Simulation Conference, Monterey, CA, (2006), pp. 2219–2224

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sayan Majumder .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Majumder, S., Bhattacharyya, D. (2020). Relation Estimation of Packets Dropped by Wormhole Attack to Packets Sent Using Regression Analysis. In: Mandal, J., Bhattacharya, D. (eds) Emerging Technology in Modelling and Graphics. Advances in Intelligent Systems and Computing, vol 937. Springer, Singapore. https://doi.org/10.1007/978-981-13-7403-6_49

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-7403-6_49

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-7402-9

  • Online ISBN: 978-981-13-7403-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics