Combating the Looping Behavior: A Result of Routing Layer Attack
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 4
Abstract
Routing layer is one of the most important layers of the network stack. In wireless ad hoc networks, it becomes more significant because nodes act as relay nodes or routers in the network. This characteristic puts them at risk of routing attacks. A wormhole is the most treacherous attack on a routing layer of wireless ad hoc networks. The present proposed techniques require extra hardware, clock synchronization; or they make restrict assumption to deal with this attack. We have proposed a simple behavior-based approach which uses a small amount of memory for recording a few packets received and sent by the neighboring nodes. From this information, a behavior of these nodes is detected, that is, whether the behavior is benign or malicious. Nodes exhibiting malicious behavior are placed in the blocked node list. Malicious nodes are broadcasted in the network. None of the legal nodes in the network entertains any packet from these nodes. This approach has been simulated and verified in ns2.30 which detects and isolates wormhole nodes successfully. The current study focuses on the looping behavior of this attack.
Authors and Affiliations
David Samuel Bhatti, Kinza Sardar, Meh Jabeen, Umair B. Chaudhry
Comparison between Two Adaptive Controllers Applied to Greenhouse Climate Monitoring
This paper presents a study of a multivariable Adaptive Generalized Predictive Controller and its application to control the thermal behaviour of an agricultural greenhouse, which is composed of a number of different ele...
A Serious Game for Healthcare Industry: Information Security Awareness Training Program for Hospital Universiti Kebangsaan Malaysia
This paper aims to develop an information security awareness training program for the healthcare industry to ensure the appropriate protection of electronic health systems. Serious games are primarily designed for traini...
Comparison of Event Choreography and Orchestration Techniques in Microservice Architecture
Microservice Architecture (MSA) is an architectural design pattern which was introduced to solve the challenges involved in achieving the horizontal scalability, high availability, modularity and infrastructure agility f...
A Distributed Method to Localization for Mobile Sensor Networks based on the convex hull
There has been recently a trend of exploiting the heterogeneity in WSNs and the mobility of either the sensor nodes or the sink nodes to facilitate data dissemination in WSNs. Recently, there has been much focus on mobil...
Proposing a Keyword Extraction Scheme based on Standard Deviation, Frequency and Conceptual Relation of the Words
At each text there are a few keywords which provide important information about the content of that text. Since this limited set of words (keywords) is supposed to describe the total concept of a text (e.g. article, book...