Skip to main content
Log in

Smaclad: Secure Mobile Agent Based Cross Layer Attack Detection and Mitigation in Wireless Network

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Threats in wireless network are common these days and when it comes to security threats their consequences are countless. Some of the most commonly witnessed security threats are route manipulation and jamming. There are several researches that are proposed to even more enhance the efficiency of these attacks against their counterfeit. The recently proposed and the most challenging threat is the cross-layer attack. Though we have solutions for single-layer attacks there are very few or no satisfactory methods to detect and counter-attack the cross-layer attacks. With this as the main goal for this paper we proposed a novel framework that secures the wireless network from cross-layer attacks. This proposal concentrates on both detecting and mitigating the attack. The former one is based on Bayesian learning detecting scheme and the later on is constructed to enhance security and performance of the network. The composed protocol is tested on a framework with cross layer attack that utilizes jamming.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Miao J, Hu Z, Yang K, Wang C, Tian H (2012) Joint Power and Bandwidth Allocation Algorithm with QoS Support in Heterogeneous Wireless Networks. IEEE Communications Letters, 16(4), 1089–7798/12$31.00_c2011 IEEE

  2. Raza Bukhari SH, Rehmani MH, Siraj S (2016) A survey of channel bonding for wireless networks and guidelines of channel bonding for futuristic cognitive radio sensor networks. Communications Surveys & Tutorials, https://doi.org/10.1109/COMST.2015.2504408, IEEE

  3. Jie Z, Jiandong L, Qin L, Hua S, Xiaoniu Y (2014) On minimizing delay with probabilistic splitting of traffic flow in heterogeneous wireless networks. Communications System Design, China Communications

  4. Zhang Q, Zhang Y-Q (2008) Cross-layer design for qos support in multihop wireless networks. Proceedings of the IEEE 96(1), 0018–9219/$25.00 _2007 IEEE

  5. Huang H, Gong T, Zhang R, Yang L, Zhang J, Xiao F (2018) Intrusion detection based on k-coverage in mobile sensor networks with empowered intruders. IEEE Trans Veh Technol. https://doi.org/10.1109/TVT.2018.2872848

  6. Zhao P, Yang X (2016) Opportunistic routing for bandwidth-sensitiven traffic in wireless networks with lossy links. Journal of Communications and Networks 18(5), Digital object identifier. https://doi.org/10.1109/JCN.2016.000109, 1229-2370/16/$10.00 c 2016

  7. Mashima D, Gunathilaka P, Chen B (2018) Artificial command delaying for secure substation network control: design and implementation. IEEE Transactions on Smart Grid. https://doi.org/10.1109/TSG.2017.2744802

  8. Meng W, Li W, Su C, Zhou J, Lu R (2018) enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. Received October 1, 2017, accepted October 28, 2017, date of publication November 13, 2017, date of current version March 9, 2018

  9. Guan Y, Ge X (2017) Distributed attack detection and secure estimationof networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Transactions on Signal and Information Processing Over Networks

  10. Guo H, Yang Z, Zhang L, Zhu J, Zou Y (2017) Joint cooperative beamforming and jamming for physical-layer security of decode-and-forward relay networks. Received August 11, 2017, accepted September 4, 2017, date of publication September 14, 2017, date of current version October 12, 2017

  11. Pan Y, Hou Y, Li M, Gerdes RM, Zeng K, Towfiq MA, Cetiner BA (2017) Message integrity protection over wireless channel: countering signal cancellation via channel randomization. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2017.2751600

  12. Yi C-W (2009) Unified analytic framework based on minimum scan statistics for wireless Ad Hoc and sensor networks. IEEE Transactions on Parallel and Distributed Systems 20(9), 1045–9219/09/$25.00 _ 2009 IEEE

  13. Fang D, Qian Y, Hu RQ (2017) Security for 5G Mobile Wireless Networks. Department of Electrical and Computer Engineering, University of Nebraska–Lincoln, Omaha, 2169–3536, IEEE

  14. Tian F, Chen X, Liu S, Yuan X, Li D, Zhang X, Yang Z (2018) Secrecy rate optimization in wireless multi-hop full duplex networks. Special Section on Secure Modulations for Future Wireless Communications and Mobile Networks, Digital Object Identifier. https://doi.org/10.1109/Access.2018.2794739

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Nithya.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nithya, S., Gomathy, C. Smaclad: Secure Mobile Agent Based Cross Layer Attack Detection and Mitigation in Wireless Network. Mobile Netw Appl 24, 259–270 (2019). https://doi.org/10.1007/s11036-018-1201-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-018-1201-1

Keywords

Navigation