Combating the Looping Behavior: A Result of Routing Layer Attack

Abstract

Routing layer is one of the most important layers of the network stack. In wireless ad hoc networks, it becomes more significant because nodes act as relay nodes or routers in the network. This characteristic puts them at risk of routing attacks. A wormhole is the most treacherous attack on a routing layer of wireless ad hoc networks. The present proposed techniques require extra hardware, clock synchronization; or they make restrict assumption to deal with this attack. We have proposed a simple behavior-based approach which uses a small amount of memory for recording a few packets received and sent by the neighboring nodes. From this information, a behavior of these nodes is detected, that is, whether the behavior is benign or malicious. Nodes exhibiting malicious behavior are placed in the blocked node list. Malicious nodes are broadcasted in the network. None of the legal nodes in the network entertains any packet from these nodes. This approach has been simulated and verified in ns2.30 which detects and isolates wormhole nodes successfully. The current study focuses on the looping behavior of this attack.

Authors and Affiliations

David Samuel Bhatti, Kinza Sardar, Meh Jabeen, Umair B. Chaudhry

Keywords

Related Articles

Comparison between Two Adaptive Controllers Applied to Greenhouse Climate Monitoring

This paper presents a study of a multivariable Adaptive Generalized Predictive Controller and its application to control the thermal behaviour of an agricultural greenhouse, which is composed of a number of different ele...

A Serious Game for Healthcare Industry: Information Security Awareness Training Program for Hospital Universiti Kebangsaan Malaysia

This paper aims to develop an information security awareness training program for the healthcare industry to ensure the appropriate protection of electronic health systems. Serious games are primarily designed for traini...

Comparison of Event Choreography and Orchestration Techniques in Microservice Architecture

Microservice Architecture (MSA) is an architectural design pattern which was introduced to solve the challenges involved in achieving the horizontal scalability, high availability, modularity and infrastructure agility f...

A Distributed Method to Localization for Mobile Sensor Networks based on the convex hull

There has been recently a trend of exploiting the heterogeneity in WSNs and the mobility of either the sensor nodes or the sink nodes to facilitate data dissemination in WSNs. Recently, there has been much focus on mobil...

Proposing a Keyword Extraction Scheme based on Standard Deviation, Frequency and Conceptual Relation of the Words

At each text there are a few keywords which provide important information about the content of that text. Since this limited set of words (keywords) is supposed to describe the total concept of a text (e.g. article, book...

Download PDF file
  • EP ID EP286445
  • DOI 10.14569/IJACSA.2018.090463
  • Views 79
  • Downloads 0

How To Cite

David Samuel Bhatti, Kinza Sardar, Meh Jabeen, Umair B. Chaudhry (2018). Combating the Looping Behavior: A Result of Routing Layer Attack. International Journal of Advanced Computer Science & Applications, 9(4), 456-465. https://europub.co.uk/articles/-A-286445