Abstract
Threats in wireless network are common these days and when it comes to security threats their consequences are countless. Some of the most commonly witnessed security threats are route manipulation and jamming. There are several researches that are proposed to even more enhance the efficiency of these attacks against their counterfeit. The recently proposed and the most challenging threat is the cross-layer attack. Though we have solutions for single-layer attacks there are very few or no satisfactory methods to detect and counter-attack the cross-layer attacks. With this as the main goal for this paper we proposed a novel framework that secures the wireless network from cross-layer attacks. This proposal concentrates on both detecting and mitigating the attack. The former one is based on Bayesian learning detecting scheme and the later on is constructed to enhance security and performance of the network. The composed protocol is tested on a framework with cross layer attack that utilizes jamming.
Similar content being viewed by others
References
Miao J, Hu Z, Yang K, Wang C, Tian H (2012) Joint Power and Bandwidth Allocation Algorithm with QoS Support in Heterogeneous Wireless Networks. IEEE Communications Letters, 16(4), 1089–7798/12$31.00_c2011 IEEE
Raza Bukhari SH, Rehmani MH, Siraj S (2016) A survey of channel bonding for wireless networks and guidelines of channel bonding for futuristic cognitive radio sensor networks. Communications Surveys & Tutorials, https://doi.org/10.1109/COMST.2015.2504408, IEEE
Jie Z, Jiandong L, Qin L, Hua S, Xiaoniu Y (2014) On minimizing delay with probabilistic splitting of traffic flow in heterogeneous wireless networks. Communications System Design, China Communications
Zhang Q, Zhang Y-Q (2008) Cross-layer design for qos support in multihop wireless networks. Proceedings of the IEEE 96(1), 0018–9219/$25.00 _2007 IEEE
Huang H, Gong T, Zhang R, Yang L, Zhang J, Xiao F (2018) Intrusion detection based on k-coverage in mobile sensor networks with empowered intruders. IEEE Trans Veh Technol. https://doi.org/10.1109/TVT.2018.2872848
Zhao P, Yang X (2016) Opportunistic routing for bandwidth-sensitiven traffic in wireless networks with lossy links. Journal of Communications and Networks 18(5), Digital object identifier. https://doi.org/10.1109/JCN.2016.000109, 1229-2370/16/$10.00 c 2016
Mashima D, Gunathilaka P, Chen B (2018) Artificial command delaying for secure substation network control: design and implementation. IEEE Transactions on Smart Grid. https://doi.org/10.1109/TSG.2017.2744802
Meng W, Li W, Su C, Zhou J, Lu R (2018) enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. Received October 1, 2017, accepted October 28, 2017, date of publication November 13, 2017, date of current version March 9, 2018
Guan Y, Ge X (2017) Distributed attack detection and secure estimationof networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Transactions on Signal and Information Processing Over Networks
Guo H, Yang Z, Zhang L, Zhu J, Zou Y (2017) Joint cooperative beamforming and jamming for physical-layer security of decode-and-forward relay networks. Received August 11, 2017, accepted September 4, 2017, date of publication September 14, 2017, date of current version October 12, 2017
Pan Y, Hou Y, Li M, Gerdes RM, Zeng K, Towfiq MA, Cetiner BA (2017) Message integrity protection over wireless channel: countering signal cancellation via channel randomization. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2017.2751600
Yi C-W (2009) Unified analytic framework based on minimum scan statistics for wireless Ad Hoc and sensor networks. IEEE Transactions on Parallel and Distributed Systems 20(9), 1045–9219/09/$25.00 _ 2009 IEEE
Fang D, Qian Y, Hu RQ (2017) Security for 5G Mobile Wireless Networks. Department of Electrical and Computer Engineering, University of Nebraska–Lincoln, Omaha, 2169–3536, IEEE
Tian F, Chen X, Liu S, Yuan X, Li D, Zhang X, Yang Z (2018) Secrecy rate optimization in wireless multi-hop full duplex networks. Special Section on Secure Modulations for Future Wireless Communications and Mobile Networks, Digital Object Identifier. https://doi.org/10.1109/Access.2018.2794739
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Nithya, S., Gomathy, C. Smaclad: Secure Mobile Agent Based Cross Layer Attack Detection and Mitigation in Wireless Network. Mobile Netw Appl 24, 259–270 (2019). https://doi.org/10.1007/s11036-018-1201-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-018-1201-1