Skip to main content

Survey of Different Countermeasure on Network Layer Attack in Wireless Network

  • Conference paper
  • First Online:
  • 2246 Accesses

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 89))

Abstract

In recent times, wireless network builds a bridge between the physical and virtual worlds. It poses security threats at different layers. The most vital security issue is observed on the network layer on different wireless networked systems. Defense mechanisms are used to shield the network layer from these repetitive malicious attacks. Malicious hubs are detected and differentiated along the network by using these mechanisms. These networks truly require a unified security answer for ensuring both course and information transmission tasks on the network layer. Without a suitable security solution, malicious nodes in the network can disturb rapidly across the network. This just irritates the system activity from exact delivery of packets and malevolent hubs that can disturb transmissions or drop all packets going through them. The main objective is to outline the different attacks and the countermeasures used to ensure the network security against pernicious attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Singh RK, Nand P (2016) Literature review of routing attacks in MANET. In: 2016 international conference on computing, communication and automation (ICCCA). Noida, pp 525–530. https://doi.org/10.1109/ccaa.2016.7813776

  2. Meddeb R, Triki B, Jemili F, Korbaa O (2017) A survey of attacks in mobile ad hoc networks. In: 2017 international conference on engineering & MIS (ICEMIS). Monastir, pp 1–7

    Google Scholar 

  3. Yao et al Y (2018) Multi-channel based sybil attack detection in vehicular ad hoc networks using RSSI. In: IEEE Trans Mob Comput. https://doi.org/10.1109/tmc.2018.2833849

  4. Kumar S, Goyal M, Goyal D, Poonia RC (2017) Routing protocols and security issues in MANET. In: 2017 international conference on Infocom technologies and unmanned systems (trends and future directions) (ICTUS). Dubai, pp 818–824

    Google Scholar 

  5. Wang Q, Dunlap T, Cho Y, Qu G (2017) DoS attacks and countermeasures on network devices. In: 2017 26th wireless and optical communication conference (WOCC). Newark, NJ, pp 1–6

    Google Scholar 

  6. Korde S, Sarode MV (2017) Review on network layer attacks detection and prevention techniques in mobile ad hoc networks. In: 2017 international conference on inventive systems and control (ICISC). Coimbatore, pp 1–5

    Google Scholar 

  7. Chang S, Hu Y (2017) SecureMAC: securing wireless medium access control against insider denial-of-service attacks. IEEE Trans Mob Comput 16(12):3527–3540

    Article  Google Scholar 

  8. Simpson S, Shirazi SN, Marnerides A, Jouet S, Pezaros D, Hutchison D (2018) An inter-domain collaboration scheme to remedy DDoS attacks in computer networks. IEEE Trans Netw Serv Manage 15(3):879–893

    Article  Google Scholar 

  9. Wang A, Chang W, Chen S, Mohaisen A (2018) Delving into internet DDoS attacks by Botnets: characterization and analysis. In: IEEE/ACM Trans Netw. https://doi.org/10.1109/tnet.2018.2874896

  10. SunilKumar KN, Shivashankar (2017) A review on security and privacy issues in wireless sensor networks. In: 2017 2nd IEEE international conference on recent trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, pp 1979–1984. https://doi.org/10.1109/rteict.2017.8256945

  11. Zhang L, Nie G, Ding G, Wu Q, Zhang Z, Han Z (2018) Byzantine attacker identification in collaborative spectrum sensing: a robust defense framework. In: IEEE Trans Mob Comput. https://doi.org/10.1109/tmc.2018.2869390

  12. Surya SR, Magrica GA (2017) A survey on wireless networks attacks. In: 2017 2nd international conference on computing and communications technologies (ICCCT), Chennai, pp 240–247

    Google Scholar 

  13. Soliman JN, Mageed TA, El-Hennawy HM (2017) Countermeasures for layered security attacks on cognitive radio networks based on modified digital signature scheme. In: 2017 eighth international conference on intelligent computing and information systems (ICICIS). Cairo, pp 2–8

    Google Scholar 

  14. Kumar P, Tripathi M, Nehra A, Conti M, Lal C (2018) Safety: early detection and mitigation of TCP SYN flood utilizing entropy in SDN. In: IEEE Trans Netw Serv Manage. https://doi.org/10.1109/tnsm.2018.2861741

  15. Deeksha AK, Bansal M (2017) A review on VANET security attacks and their countermeasure. In: 2017 4th international conference on signal processing, computing and control (ISPCC). Solan, pp 580–585

    Google Scholar 

  16. Santhi G, Sowmiya R (2017) A survey on various attacks and countermeasures in wireless sensor networks. Int J Comput Appl 159(7):0975–8887

    Google Scholar 

  17. Sinha P, Jha VK, Rai AK, Bhushan B (2017) Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: a survey. In: 2017 international conference on signal processing and communication (ICSPC). Coimbatore, pp 288–293. https://doi.org/10.1109/cspc.2017.8305855

  18. Tomić I, McCann JA (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet Things J 4(6):1910–1923. https://doi.org/10.1109/JIOT.2017.2749883

    Article  Google Scholar 

  19. Chen K, Zhang Y, Liu P (2018) Leveraging information asymmetry to transform android apps into self-defending code against repackaging attacks. IEEE Trans Mob Comput 17(8):1879–1893

    Article  Google Scholar 

  20. Moudni H, Er-rouidi M, Mouncif H, Hadadi BE (2016) Secure routing protocols for mobile ad hoc networks. In: 2016 international conference on information technology for organizations development (IT4OD). March 2016, pp 1–7

    Google Scholar 

  21. Moubarak J, Filiol E, Chamoun M (2018) On blockchain security and relevant attacks. In: 2018 IEEE middle east and north africa communications conference (MENACOMM). Jounieh, pp 1–6. https://doi.org/10.1109/menacomm.2018.8371010

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amruta Chavan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chavan, A., Jadhav, D., Marathe, N., Dongre, N. (2020). Survey of Different Countermeasure on Network Layer Attack in Wireless Network. In: Ranganathan, G., Chen, J., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 89. Springer, Singapore. https://doi.org/10.1007/978-981-15-0146-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0146-3_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0145-6

  • Online ISBN: 978-981-15-0146-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics