Abstract
Secured self organizing network is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. In delay tolerant network packets storage exists when there is any link breakage between the nodes in the network so delay is tolerable in this type of network during the data transmission. But this delay is not tolerable in wireless network for voice packet transmission. This evokes the use of wireless networks. In a network, different wireless network topologies are interoperating with each other so the communication across the network is called overlay network. This network is vulnerable to attacks due to mobile behaviour of nodes and frequent changes in topologies of the network. The attacks are wormhole attack and blackhole attack is analysed in this paper. They are critical threats to normal operation in wireless networks which results in the degradation of the network performance. The proposed recovery algorithm for wormhole and the isolation of blackhole will increase the performance of the network. The performance metrics such as throughput, packet delivery ratio, end–end delay and routing overhead of the network are evaluated.
Similar content being viewed by others
References
Wu, B., Chen, J., Wu, J., & Cardei, M. (2006). A survey on attacks and countermeasures in mobile adhoc networks. In Y. Xiao, X. Shen & D.-Z. Du (Eds.), Wireless/mobile network security (pp. 1–38). Berlin: Springer.
Supriya, K. M. (2012). Mobile Ad Hoc netwoks security attacks and secured routing protocols: A survey. In: N. Meghanathan, N. Chaki & D. Nagamalai (Eds.), Advances in computer science and information technology. Networks and communications. CCSIT 2012. Lecture notes of the institute for computer sciences, Social informatics and telecommunications engineering (Vol. 84, pp. 119–124). Berlin: Springer.
Liang, Y., Poor, H. V., & Ying, L. (2011). Secrecy throughput of MANETs under passive and active attacks. IEEE Transactions On Information Theory, 57(10), 6692–6702.
Ren, Y., Chuah, M. C., Yang, J., & Chen, Y. (2010). Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks]. IEEE Wireless Communications, 17(5), 36–42.
Hu, Y.-C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2), 370–380.
Tseng, F. H., Chou, L. D., & Chao, H. C. (2011). A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Computing and Information Sciences, 1(1), 4.
Ghonge, M. M., Jawandhiya, P. M., & Ali, M. S. (2011). Countermeasures of network layer attacks in MANET. In IEEE conference special issue on network security and cryptography.
Nadeem, A., & Howarth, M. P. (2013). A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Communications Surveys & Tutorials, 15(4), 2027–2045.
Maheshwari, R., Gao, J., & Das, S. R. (2007). Detecting wormhole attacks in wireless networks using connectivity information. In Proceedings of IEEE INFOCOM.
Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of IEEE INFOCOM.
Su, M.-Y. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, 34, 107–117.
Li, F., Srinivasan, A., & Wu, J. (2009). Thwarting blackhole attacks in distruption-tolerant networks using encounter tickets. In Proceedings of IEEE INFOCOM.
Djahel, S., Naıt-Abdesselam, F., & Zhang, Z. (2011). Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges. IEEE Communication Surveys, 13(4), 658–672.
Guttoski, P. B., Sunye, M. S., & Silva, F. (2007). Kruskal’s algorithm for query tree optimization. In International database engineering and applications symposium. IEEE.
Euclidean Distance. http://www.pbarett.net/techpapers/euclid.pdf,accessed. 29 March 2015.
Network Simulator 2 & 3. http://www.isi.edu/nsnam/ns.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jyothirmai, P., Raj, J.S. & Smys, S. Secured Self Organizing Network Architecture in Wireless Personal Networks. Wireless Pers Commun 96, 5603–5620 (2017). https://doi.org/10.1007/s11277-017-4436-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4436-4