Combating the Looping Behavior: A Result of Routing Layer Attack
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 4
Abstract
Routing layer is one of the most important layers of the network stack. In wireless ad hoc networks, it becomes more significant because nodes act as relay nodes or routers in the network. This characteristic puts them at risk of routing attacks. A wormhole is the most treacherous attack on a routing layer of wireless ad hoc networks. The present proposed techniques require extra hardware, clock synchronization; or they make restrict assumption to deal with this attack. We have proposed a simple behavior-based approach which uses a small amount of memory for recording a few packets received and sent by the neighboring nodes. From this information, a behavior of these nodes is detected, that is, whether the behavior is benign or malicious. Nodes exhibiting malicious behavior are placed in the blocked node list. Malicious nodes are broadcasted in the network. None of the legal nodes in the network entertains any packet from these nodes. This approach has been simulated and verified in ns2.30 which detects and isolates wormhole nodes successfully. The current study focuses on the looping behavior of this attack.
Authors and Affiliations
David Samuel Bhatti, Kinza Sardar, Meh Jabeen, Umair B. Chaudhry
Semantic Searching and Ranking of Documents using Hybrid Learning System and WordNet
Semantic searching seeks to improve search accuracy of the search engine by understanding searcher’s intent and the contextual meaning of the terms present in the query to retrieve more relevant results. To find out the...
2.5 D Facial Analysis via Bio-Inspired Active Appearance Model and Support Vector Machine for Forensic Application
In this paper, a fully automatic 2.5D facial technique for forensic applications is presented. Feature extraction and classification are fundamental processes in any face identification technique. Two methods for feature...
New Method Based on Multi-Threshold of Edges Detection in Digital Images
Edges characterize object boundaries in image and are therefore useful for segmentation, registration, feature extraction, and identification of objects in a scene. Edges detection is used to classify, interpret and anal...
Development and Evaluation of Massive Open Online Course (MOOC) as a Supplementary Learning Tool: An Initial Study
The popularity of Massive Open Online Courses (MOOCs) is prevalent among researchers and practitioners as a new paradigm of open education resource. Since the development of this technology may entail enormous investment...
An Approach to Improve Classification Accuracy of Leaf Images using Dorsal and Ventral Features
This paper proposes to improve the classification accuracy of the leaf images by extracting texture and statistical features by utilizing the presence of striking features on the dorsal and ventral sides of the leaves, w...