Combating the Looping Behavior: A Result of Routing Layer Attack

Abstract

Routing layer is one of the most important layers of the network stack. In wireless ad hoc networks, it becomes more significant because nodes act as relay nodes or routers in the network. This characteristic puts them at risk of routing attacks. A wormhole is the most treacherous attack on a routing layer of wireless ad hoc networks. The present proposed techniques require extra hardware, clock synchronization; or they make restrict assumption to deal with this attack. We have proposed a simple behavior-based approach which uses a small amount of memory for recording a few packets received and sent by the neighboring nodes. From this information, a behavior of these nodes is detected, that is, whether the behavior is benign or malicious. Nodes exhibiting malicious behavior are placed in the blocked node list. Malicious nodes are broadcasted in the network. None of the legal nodes in the network entertains any packet from these nodes. This approach has been simulated and verified in ns2.30 which detects and isolates wormhole nodes successfully. The current study focuses on the looping behavior of this attack.

Authors and Affiliations

David Samuel Bhatti, Kinza Sardar, Meh Jabeen, Umair B. Chaudhry

Keywords

Related Articles

Formalization of Learning Patterns Through SNKA

The Learning patterns found among the learners community is steadily progressing towards the digitalized world. The learning patterns arise from acquiring and sharing knowledge. More impact is found on the usage of knowl...

Impact of Medical Technology on Expansion in Healthcare Expenses

The impact of medical technology on expansion in health care expenses has long been a subject of essential interest, mainly in the context of long-term outcrops of health spending, which must deal with the issue of the a...

Common Radio Resource Management Algorithms in Heterogeneous Wireless Networks with KPI Analysis

The rapid increase of number of personal wireless communication equipped devices boosts the user service demands on wireless networks. Thus, the spectrum resource management in such networks becomes an important topic in...

Performance Chronicles of Multicast Routing Protocol in Wireless Sensor Network

Routing protocol in wireless sensor network (WSN) has always been a frequently adopted topic of research in WSN owing to many unsolved issues in it. This paper discusses about the multicast routing protocols in WSN and b...

Piezoelectric based Biosignal Transmission using Xbee

This paper is showcasing the development of an innovative healthcare solution that will allow patient to be monitored remotely. The system utilizes a piezoelectric sheet sensor and XBee wireless communication protocol to...

Download PDF file
  • EP ID EP286445
  • DOI 10.14569/IJACSA.2018.090463
  • Views 67
  • Downloads 0

How To Cite

David Samuel Bhatti, Kinza Sardar, Meh Jabeen, Umair B. Chaudhry (2018). Combating the Looping Behavior: A Result of Routing Layer Attack. International Journal of Advanced Computer Science & Applications, 9(4), 456-465. https://europub.co.uk/articles/-A-286445