Abstract
In recent times, wireless network builds a bridge between the physical and virtual worlds. It poses security threats at different layers. The most vital security issue is observed on the network layer on different wireless networked systems. Defense mechanisms are used to shield the network layer from these repetitive malicious attacks. Malicious hubs are detected and differentiated along the network by using these mechanisms. These networks truly require a unified security answer for ensuring both course and information transmission tasks on the network layer. Without a suitable security solution, malicious nodes in the network can disturb rapidly across the network. This just irritates the system activity from exact delivery of packets and malevolent hubs that can disturb transmissions or drop all packets going through them. The main objective is to outline the different attacks and the countermeasures used to ensure the network security against pernicious attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Singh RK, Nand P (2016) Literature review of routing attacks in MANET. In: 2016 international conference on computing, communication and automation (ICCCA). Noida, pp 525–530. https://doi.org/10.1109/ccaa.2016.7813776
Meddeb R, Triki B, Jemili F, Korbaa O (2017) A survey of attacks in mobile ad hoc networks. In: 2017 international conference on engineering & MIS (ICEMIS). Monastir, pp 1–7
Yao et al Y (2018) Multi-channel based sybil attack detection in vehicular ad hoc networks using RSSI. In: IEEE Trans Mob Comput. https://doi.org/10.1109/tmc.2018.2833849
Kumar S, Goyal M, Goyal D, Poonia RC (2017) Routing protocols and security issues in MANET. In: 2017 international conference on Infocom technologies and unmanned systems (trends and future directions) (ICTUS). Dubai, pp 818–824
Wang Q, Dunlap T, Cho Y, Qu G (2017) DoS attacks and countermeasures on network devices. In: 2017 26th wireless and optical communication conference (WOCC). Newark, NJ, pp 1–6
Korde S, Sarode MV (2017) Review on network layer attacks detection and prevention techniques in mobile ad hoc networks. In: 2017 international conference on inventive systems and control (ICISC). Coimbatore, pp 1–5
Chang S, Hu Y (2017) SecureMAC: securing wireless medium access control against insider denial-of-service attacks. IEEE Trans Mob Comput 16(12):3527–3540
Simpson S, Shirazi SN, Marnerides A, Jouet S, Pezaros D, Hutchison D (2018) An inter-domain collaboration scheme to remedy DDoS attacks in computer networks. IEEE Trans Netw Serv Manage 15(3):879–893
Wang A, Chang W, Chen S, Mohaisen A (2018) Delving into internet DDoS attacks by Botnets: characterization and analysis. In: IEEE/ACM Trans Netw. https://doi.org/10.1109/tnet.2018.2874896
SunilKumar KN, Shivashankar (2017) A review on security and privacy issues in wireless sensor networks. In: 2017 2nd IEEE international conference on recent trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, pp 1979–1984. https://doi.org/10.1109/rteict.2017.8256945
Zhang L, Nie G, Ding G, Wu Q, Zhang Z, Han Z (2018) Byzantine attacker identification in collaborative spectrum sensing: a robust defense framework. In: IEEE Trans Mob Comput. https://doi.org/10.1109/tmc.2018.2869390
Surya SR, Magrica GA (2017) A survey on wireless networks attacks. In: 2017 2nd international conference on computing and communications technologies (ICCCT), Chennai, pp 240–247
Soliman JN, Mageed TA, El-Hennawy HM (2017) Countermeasures for layered security attacks on cognitive radio networks based on modified digital signature scheme. In: 2017 eighth international conference on intelligent computing and information systems (ICICIS). Cairo, pp 2–8
Kumar P, Tripathi M, Nehra A, Conti M, Lal C (2018) Safety: early detection and mitigation of TCP SYN flood utilizing entropy in SDN. In: IEEE Trans Netw Serv Manage. https://doi.org/10.1109/tnsm.2018.2861741
Deeksha AK, Bansal M (2017) A review on VANET security attacks and their countermeasure. In: 2017 4th international conference on signal processing, computing and control (ISPCC). Solan, pp 580–585
Santhi G, Sowmiya R (2017) A survey on various attacks and countermeasures in wireless sensor networks. Int J Comput Appl 159(7):0975–8887
Sinha P, Jha VK, Rai AK, Bhushan B (2017) Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: a survey. In: 2017 international conference on signal processing and communication (ICSPC). Coimbatore, pp 288–293. https://doi.org/10.1109/cspc.2017.8305855
Tomić I, McCann JA (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet Things J 4(6):1910–1923. https://doi.org/10.1109/JIOT.2017.2749883
Chen K, Zhang Y, Liu P (2018) Leveraging information asymmetry to transform android apps into self-defending code against repackaging attacks. IEEE Trans Mob Comput 17(8):1879–1893
Moudni H, Er-rouidi M, Mouncif H, Hadadi BE (2016) Secure routing protocols for mobile ad hoc networks. In: 2016 international conference on information technology for organizations development (IT4OD). March 2016, pp 1–7
Moubarak J, Filiol E, Chamoun M (2018) On blockchain security and relevant attacks. In: 2018 IEEE middle east and north africa communications conference (MENACOMM). Jounieh, pp 1–6. https://doi.org/10.1109/menacomm.2018.8371010
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chavan, A., Jadhav, D., Marathe, N., Dongre, N. (2020). Survey of Different Countermeasure on Network Layer Attack in Wireless Network. In: Ranganathan, G., Chen, J., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 89. Springer, Singapore. https://doi.org/10.1007/978-981-15-0146-3_7
Download citation
DOI: https://doi.org/10.1007/978-981-15-0146-3_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0145-6
Online ISBN: 978-981-15-0146-3
eBook Packages: EngineeringEngineering (R0)