Journal ArticleDOI
ITCA, an IDS and Trust Solution Collaborated with ACK Based Approach to Mitigate Network Layer Attack on MANET Routing
Nilesh Marathe,Subhash K. Shinde +1 more
Reads0
Chats0
TLDR
The proposed consolidated approach, IDS and Trust solution Collaborated with Ack based approach (ITCA), performs identification of attack, isolation of misbehaving nodes and control behavior of nodes in the network, which enables the routing process to be more robust by resisting the malicious nodes from being the part of a route, avoid attack formation and thus supports to improve the efficiency.Abstract:
The feature of Dynamic topology configuration of MANET reciprocates the security constraints and bring in many security threats that hamper the routing and time bound delivery of packets. Many security schemes had been proposed to secure MANET routing and improve its efficiency. The solutions proposed by existing systems are defined in one dimension so that the targeted attack can be fixed up, but that might create flaws in other dimension or introduce new attack. So it is necessary to create a multidimensional solution that empowers the routing process to become inherently secure rather than defending one particular attack. The selfish or maliciously behaving nodes in the network are the key players in launching the attacks and disrupting the routing process. In this paper, the proposed consolidated approach named, IDS and Trust solution Collaborated with Ack based approach (ITCA), performs identification of attack, isolation of misbehaving nodes and control behavior of nodes in the network. This enables the routing process to be more robust by resisting the malicious nodes from being the part of a route, avoid attack formation and thus supports to improve the efficiency. Even though the malicious nodes are isolated, the proposed method allows them to be sender for transmitting their own data, but under controlled environment defined by IDS so that the attempt to launch DOS attack can be avoided. The reconsideration of isolated node that to under controlled IDS environment in collaboration with Trust and improved ACK based scheme is key behind proposed multidimensional method, ITCA. Further the method is integrated with AODV and extensive experimentation is done based on raising number of malicious nodes in the network to measure its effectiveness and efficiency.read more
Citations
More filters
Journal ArticleDOI
Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks
TL;DR: An intrusion detection system called ‘Accurate and Cognitive Intrusion Detection System’ (ACIDS) for detecting the most vulnerable packet dropping attack known as black hole attack has been developed and the results attest to the efficacy of ACIDS over AODV routing protocol in detecting packet dropping scenarios of the black holes attack.
Journal ArticleDOI
Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud
TL;DR: In this article, a trust-aware intrusion detection and prevention system (TA-IDPS) is proposed for protecting the network from adversaries, which consists of a MANET, a cloudlet and a cloud service layer.
Journal ArticleDOI
Novel trust evaluation using NSGA-III based adaptive neuro-fuzzy inference system
Jasleen Kaur,Supreet Kaur +1 more
TL;DR: Comparative analysis reveals that the proposed trust evaluation model outperforms the competitive trust evaluation models in terms of various performance metrics such as routing overheads, average end to end latency, packet delivery ratio, and throughput, and the proposed protocol is more secure against various security threats.
Book ChapterDOI
Improved ITCA Method to Mitigate Network-Layer Attack in MANET
Nilesh Marathe,Subhash K. Shinde +1 more
TL;DR: The Improved ITCA is proposed, which introduces a lightweight real-time option for secured ACK-based approach, whereas adaptive application-specific trust calculation parameters make the system more robust or work efficiently even when percentage of malicious node in the network is high.
Journal ArticleDOI
Multidimensional Multi-Attribute Approach to Counter the Routing Attacks on MANET
Nilesh Marathe,Subhash K. Shinde +1 more
TL;DR: The proposed framework utilize the benefit of Reputation and Trust based evaluation process to secure route discovery by isolating malicious nodes at early stage of route formation by incorporating multi-dimensional multi-attribute system (MDMA).
References
More filters
A survey of routing attacks in mobile ad hoc networks s ecurity i n w ireless m obile a d h oc a nd s ensor n etworks
TL;DR: In this paper, the authors investigate the state-of-the-art of security issues in MANET and examine routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks.
Journal ArticleDOI
A survey of routing attacks in mobile ad hoc networks
TL;DR: This article investigates the state-of-the-art of security issues in MANET and examines routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks in existing MANET protocols.
Journal ArticleDOI
Trust prediction and trust-based source routing in mobile ad hoc networks
TL;DR: This paper presents a dynamic trust prediction model to evaluate the trustworthiness of nodes, which is based on the nodes’ historical behaviors, as well as the future behaviors via extended fuzzy logic rules prediction, and integrated the proposed trust predication model into the Source Routing Mechanism.
Journal ArticleDOI
AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments
TL;DR: This paper proposes a new routing protocol, i.e., authenticated anonymous secure routing (AASR), to satisfy the requirement and defend against the attacks, and demonstrates the effectiveness of the proposed AASR protocol with improved performance as compared with the existing protocols.
Journal ArticleDOI
Building a trusted route in a mobile ad hoc network considering communication reliability and path length
Jian Wang,Yanheng Liu,Yu Jiao +2 more
TL;DR: A novel trusted route that considers communication reliability and path length for a reliable and feasible packet delivery in a MANET, and introduces the concept of attribute similarity in finding potentially friendly nodes among strangers.
Related Papers (5)
Improved ITCA Method to Mitigate Network-Layer Attack in MANET
Nilesh Marathe,Subhash K. Shinde +1 more