Combating the Looping Behavior: A Result of Routing Layer Attack

Abstract

Routing layer is one of the most important layers of the network stack. In wireless ad hoc networks, it becomes more significant because nodes act as relay nodes or routers in the network. This characteristic puts them at risk of routing attacks. A wormhole is the most treacherous attack on a routing layer of wireless ad hoc networks. The present proposed techniques require extra hardware, clock synchronization; or they make restrict assumption to deal with this attack. We have proposed a simple behavior-based approach which uses a small amount of memory for recording a few packets received and sent by the neighboring nodes. From this information, a behavior of these nodes is detected, that is, whether the behavior is benign or malicious. Nodes exhibiting malicious behavior are placed in the blocked node list. Malicious nodes are broadcasted in the network. None of the legal nodes in the network entertains any packet from these nodes. This approach has been simulated and verified in ns2.30 which detects and isolates wormhole nodes successfully. The current study focuses on the looping behavior of this attack.

Authors and Affiliations

David Samuel Bhatti, Kinza Sardar, Meh Jabeen, Umair B. Chaudhry

Keywords

Related Articles

Towards Agile Implementation of Test Maturity Model Integration (TMMI) Level 2 using Scrum Practices

the software industry has invested the substantial effort to improve the quality of its products like ISO, CMMI and TMMI. Although applying of TMMI maturity criteria has a positive impact on product quality, test enginee...

Vehicle Embedded Data Stream Processing Platform for Android Devices

Automotive information services utilizing vehicle data are rapidly expanding. However, there is currently no data centric software architecture that takes into account the scale and complexity of data involving numerous...

Voice Detection in Traditionnal Tunisian Music using Audio Features and Supervised Learning Algorithms

The research presented in this paper aims to automatically detect the singing voice in traditional Tunisian music, taking into account the main characteristics of the sound of the voice in this particular music style. Th...

Implementing and Comparison between Two Algorithms to Make a Decision in a Wireless Sensors Network

The clinical presentation of acute CO poisoning and hydrocarbon gas (Butane CAS 106-97-8) varies depending on terrain, humidity, temperature, duration of exposure and the concentration of gas toxic: From then consciousne...

A Hybrid Approach for Feature Subset Selection using Ant Colony Optimization and Multi-Classifier Ensemble

An active area of research in data mining and machine learning is dimensionality reduction. Feature subset selection is an effective technique for dimensionality reduction and an essential step in successful data mining...

Download PDF file
  • EP ID EP286445
  • DOI 10.14569/IJACSA.2018.090463
  • Views 53
  • Downloads 0

How To Cite

David Samuel Bhatti, Kinza Sardar, Meh Jabeen, Umair B. Chaudhry (2018). Combating the Looping Behavior: A Result of Routing Layer Attack. International Journal of Advanced Computer Science & Applications, 9(4), 456-465. https://europub.co.uk/articles/-A-286445