scispace - formally typeset
Open AccessJournal ArticleDOI

A model of data forwarding in MANETs for lightweight detection of malicious packet dropping

TLDR
This work introduces a model of data forwarding in MANETs which is used for recognizing malicious packet dropping behaviors and proposes an anomaly-based IDS system based on an enhanced windowing method to carry out the collection and analysis of selected cross-layer features.
About
This article is published in Computer Networks.The article was published on 2015-07-20 and is currently open access. It has received 27 citations till now. The article focuses on the topics: Network packet.

read more

Citations
More filters
Journal ArticleDOI

EAODV: detection and removal of multiple black hole attacks through sending forged packets in MANETs

TL;DR: The method proposed was able to improve traffic load in the network, identify a short and secure route, detect a number of malicious nodes and optimize the criteria of packet deliver rate, throughput and routing overhead.
Journal ArticleDOI

A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs

TL;DR: A comprehensive taxonomy of the mitigation and detection mechanism of blackhole attack and its variants is presented along with summarization and comparison of some published work related to those categories.
Journal ArticleDOI

Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks

TL;DR: A resistive to selective drop attack (RSDA) scheme to provide effective security against selective drop attacks is presented and a lightweight RSDA protocol is proposed for detecting malicious nodes in the network under a particular drop attack.
Journal ArticleDOI

Survey of Secure Routing Protocols for Wireless Ad Hoc Networks

TL;DR: The-state-of-the-art of secure routing protocols proposed in the literature that address routing security issue are surveyed, classifying secure routed protocols in categories according to the secured protocol, and finally discussing the proposed solutions.
Journal Article

A Novel Technique to Detect Malicious Packet Dropping Attacks in Wireless Sensor Networks

TL;DR: Simulation results shows that, WMC detects sinkhole attack, blackhole attack and grayhole attack with less false positive 8% and less false negative 6%.
References
More filters
Book

Wireless Communications: Principles and Practice

TL;DR: WireWireless Communications: Principles and Practice, Second Edition is the definitive modern text for wireless communications technology and system design as discussed by the authors, which covers the fundamental issues impacting all wireless networks and reviews virtually every important new wireless standard and technological development, offering especially comprehensive coverage of the 3G systems and wireless local area networks (WLANs).

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.

Dynamic Source Routing in Ad Hoc Wireless Networks.

TL;DR: In this article, the authors present a protocol for routing in ad hoc networks that uses dynamic source routing, which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI

Dynamic Source Routing in Ad Hoc Wireless Networks

TL;DR: This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Proceedings ArticleDOI

Mitigating routing misbehavior in mobile ad hoc networks

TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Related Papers (5)
Frequently Asked Questions (2)
Q1. What have the authors contributed in "A model of data forwarding in manets for lightweight detection of malicious packet dropping" ?

This work introduces a model of data forwarding in MANETs which is used for recognizing malicious packet dropping behaviors. Second, the authors propose an anomaly-based IDS system based on an enhanced windowing method to carry out the collection and analysis of selected crosslayer features. The authors evaluate their proposal in a simulation framework and the experimental results show a considerable enhancement in detection results when compared with other approaches in the literature. Third, a real deployment of the IDS is also considered by suggesting a methodology for the collection of the selected features in a distributed manner. 

Different schemes can be analyzed for that, e. g., obtaining an average of previous AC CE PT ED M AN US CR IP T threshold values, computing the threshold as a function of the mobility speed, etc. • Finally, the authors are planning to extend their approach to include an attack model where several nodes work in collusion to evade the detection process.