Abstract
Wireless Adhoc Network has a bigger range of application where some are already in commercial market and majority of them are still under roof of investigation. The degree of vulnerability of wireless adhoc network is quite high irrespective of presence of various existing techniques, which are too much specific to attack or orchestrated scenario of attack. Therefore, the proposed study introduces a framework that introduces a zombie node to capture the attention of attacker by advertising possession of many hops. The study also introduces broker node that is meant for balancing transmission demands along with robust security requirements. The message of zombie node is registered in hop table which makes the virtual zombie node to look like original node. An algorithm is constructed for identifying the malicious node and the study outcome is found to excel better performance with respect to the existing system.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Sarkar, S.K., Basavaraju, T.G., Puttamadappa, C.: Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications, 2nd edn., p. 349. CRC Press (2016)
Anjum, F., Mouchtaris, P.: Security for Wireless Ad Hoc Networks, p. 316. Wiley, New York (2007)
Bhatia, S.K., Mishra, K.K., Tiwari, S., Singh, V.K.: Advances in Computer and Computational Sciences: Proceedings of ICCCCS 2016, vol. 1, p. 775. Springer, Singapore (2017)
Khan, S., Pathan, A.-S.K.: Wireless Networks and Security: Issues, Challenges and Research Trends, p. 512. Springer, Heidelberg (2013)
Rawat, D.B.: Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, p. 577. IGI Global, Hershey (2013)
Alcaraz, C., Lopez, J.: A security analysis for wireless sensor mesh networks in highly critical systems. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 40(4), 419–428 (2010)
Grover, J., Sharma, S.: Security Issues in Wireless Sensor Network-A Review. IEEE Xplore (2016)
Alani, M.M.: MANET security: a survey. In: IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2014), Batu Ferringhi, pp. 559–564 (2014)
Qu, F., Wu, Z., Wang, F.Y., Cho, W.: A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16(6), 2985–2996 (2015)
Barskar, R., Ahirwar, M., Vishwakarma, R.: Secure key management in vehicular ad-hoc network: a review. In: International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, pp. 1688–1694 (2016)
Wu, W., Huang, N., Sun, L., Zheng, X.: Research article measurement and analysis of MANET resilience with fault tolerance strategies. Math. Prob. Eng. 2017, 10 (2017)
Zamani, E., Soltanaghaei, M.: The improved overhearing backup AODV protocol in MANET. J. Comput. Netw. Commun. 2016, 8 (2016)
Singh, R., Singh, J., Singh, R.: WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Mob. Inf. Syst. 2016, 13 (2016)
Gong, P., Chen, T.M., Xu, Q.: ETARP: an energy efficient trust-aware routing protocol for wireless sensor networks. J. Sens. 2015, 10 (2015)
Babu, M.R., Dian, S.M., Chelladurai, S., Palaniappan, M.: Proactive alleviation procedure to handle black hole attack and its version. Sci. World J. 2015, 11 (2015)
Jain, A.K., Tokekar, V.: Mitigating the effects of black hole attacks on AODV routing protocol in mobile ad hoc networks. In: International Conference on Pervasive Computing (ICPC), Pune, pp. 1–6 (2015)
Gupta, A., Rana, K.: Assessment of various attacks on AODV in malicious environment. In: 1st International Conference on Next Generation Computing Technologies (NGCT), Dehradun, pp. 153–157 (2015)
Madhusudhanan, B., Chitra, S., Rajan, C.: Mobility based key management technique for multicast security in mobile ad hoc networks. Sci. World J. 2015, 10 (2015)
Wu, W.-C., Liaw, H.-T.: A study on high secure and efficient MANET routing scheme. J. Sens. 2015, 10 (2015)
Chen, H., Chen, W., Wang, Z., Wang, Z., Li, Y.: Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014, 10 (2014)
Choi, H.-K., Kim, I.-H., Yoo, J.-C.: Secure and efficient protocol for vehicular ad hoc network with privacy preservation. EURASIP J. Wirel. Commun. Netw. 2011, 15 (2011)
Chuang, M.C., Lee, J.F.: TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 8(3), 749–758 (2014)
Li, W., Yi, P., Wu, Y., Pan, L., Li, J.: A new intrusion detection system based on KNN classification algorithm in wireless sensor network. J. Electr. Comput. Eng. 2014, 8 (2014)
Sekaran, R., Parasuraman, G.K.: A secure 3-way routing protocols for intermittently connected mobile ad hoc networks. Sci. World J. 2014, 13 (2014)
Varshney, T., Sharma, T., Sharma, P.: Implementation of watchdog protocol with AODV in mobile ad hoc network. In: Fourth International Conference on Communication Systems and Network Technologies, Bhopal, pp. 217–221 (2014)
Yuan, W.: An anonymous routing protocol with authenticated key establishment in wireless ad hoc networks. Int. J. Distrib. Sens. Netw. 2014, 10 (2014)
Vasserman, E.Y., Hopper, N.: Vampire attacks: draining life from wireless ad hoc sensor networks. IEEE Trans. Mob. Comput. 12(2), 318–332 (2013)
Wang, B., Chen, X., Chang, W.: An efficient trust-based opportunistic routing for ad hoc networks. In: International Conference on Wireless Communications and Signal Processing (WCSP), Huangshan, pp. 1–7 (2012)
Gonzalez, J.M., Anwar, M., Joshi, J.B.D.: Trust-based approaches to solve routing issues in ad-hoc wireless networks: a survey. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, pp. 556–563 (2011)
Neeli, J., Cauvery, N.K.: Insight to research progress on secure routing in wireless ad hoc network. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 8(6), 68–76 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Neeli, J., Cauvery, N.K. (2019). Framework for Capturing the Intruders in Wireless Adhoc Network Using Zombie Node. In: Silhavy, R. (eds) Cybernetics and Algorithms in Intelligent Systems . CSOC2018 2018. Advances in Intelligent Systems and Computing, vol 765. Springer, Cham. https://doi.org/10.1007/978-3-319-91192-2_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-91192-2_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-91191-5
Online ISBN: 978-3-319-91192-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)