scispace - formally typeset
Open AccessJournal ArticleDOI

A model of data forwarding in MANETs for lightweight detection of malicious packet dropping

Reads0
Chats0
TLDR
This work introduces a model of data forwarding in MANETs which is used for recognizing malicious packet dropping behaviors and proposes an anomaly-based IDS system based on an enhanced windowing method to carry out the collection and analysis of selected cross-layer features.
About
This article is published in Computer Networks.The article was published on 2015-07-20 and is currently open access. It has received 27 citations till now. The article focuses on the topics: Network packet.

read more

Citations
More filters
Journal ArticleDOI

BD-VTE: A Novel Baseline Data Based Verifiable Trust Evaluation Scheme for Smart Network Systems

TL;DR: An active trust verification mechanism is innovatively proposed in the VTE mechanism, which evaluates the trust of MVs by sending UAVs to perceive IoT devices data as baseline data, which is a fundamental change to the previous passive and unverifiable trust mechanism.
Journal ArticleDOI

Intelligent agents defending for an IoT world: A review

TL;DR: 2020 is anticipated as the turning point where deployments become common, not merely just a topic of conversation but where the need for collective, intelligent detection agents work across all layers of the IoT becomes a reality.
Journal ArticleDOI

Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks

TL;DR: A novel technique using Localized Secure Architecture for MANET (LSAM) routing protocol is proposed to detect and prevent co-operative black hole attack and it is shown that the proposed protocol is more secured and efficient.
Journal ArticleDOI

An active and verifiable trust evaluation approach for edge computing

TL;DR: An Active and Verifiable Trust Evaluation (AVTE) approach is proposed to identify the credibility of IoT devices, so to ensure reliable data collection for Edge Computing with low cost and theoretical analysis shows that AVTE approach can improve the data collection rate by 0.5 ~ 23.16% while ensuring long network lifetime compared with the existing scheme.
Journal ArticleDOI

A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks

TL;DR: A fully decentralized mechanism that allows a node to monitor and detect neighbors that are malicious even if they have a changing behavior, based on a Bernoulli Bayesian model for nodes behavior classification and a Markov chain model for behavior evolution tracking is proposed.
References
More filters
Journal ArticleDOI

Prevention of Co-operative Black Hole Attack in MANET

TL;DR: Computer simulation using GLOMOSIM shows that the proposed protocol provides better security and also better performance in terms of packet delivery than the conventional AODV in the presence of Black holes with minimal additional delay and Overhead.
Journal ArticleDOI

Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges

TL;DR: A comprehensive survey investigation on the state-of-the-art countermeasures to deal with the packet dropping attack is made and the challenges that remain to be tackled by researchers for constructing an in-depth defense against such a sophisticated attack are examined.
Proceedings ArticleDOI

Cooperative black and gray hole attacks in mobile ad hoc networks

TL;DR: A complete protocol to detect a chain of cooperating malicious nodes in an ad hoc network that disrupts transmission of data by feeding wrong routing information by ensuring an end-to-end checking between the transmission of two blocks of data.
Proceedings ArticleDOI

Friends and foes: preventing selfishness in open mobile ad hoc networks

TL;DR: A novel algorithm is proposed that aims to discourage selfish behavior in mobile ad hoc networks and is based on the assumption that all nodes were cooperative.
Journal ArticleDOI

An intrusion detection & adaptive response mechanism for MANETs

TL;DR: An intrusion detection & adaptive response mechanism for MANETs that detects a range of attacks and provides an effective response with low network degradation and an analysis of the impact shows that it allows a flexible approach to management of threats and demonstrates improved network performance with a low network overhead.
Related Papers (5)
Frequently Asked Questions (2)
Q1. What have the authors contributed in "A model of data forwarding in manets for lightweight detection of malicious packet dropping" ?

This work introduces a model of data forwarding in MANETs which is used for recognizing malicious packet dropping behaviors. Second, the authors propose an anomaly-based IDS system based on an enhanced windowing method to carry out the collection and analysis of selected crosslayer features. The authors evaluate their proposal in a simulation framework and the experimental results show a considerable enhancement in detection results when compared with other approaches in the literature. Third, a real deployment of the IDS is also considered by suggesting a methodology for the collection of the selected features in a distributed manner. 

Different schemes can be analyzed for that, e. g., obtaining an average of previous AC CE PT ED M AN US CR IP T threshold values, computing the threshold as a function of the mobility speed, etc. • Finally, the authors are planning to extend their approach to include an attack model where several nodes work in collusion to evade the detection process.