Utilisation of DANGER and PAMP signals to detect a MANET Packet Storage Time Attack

Main Article Content

Lincy Elizebeth Jim http://orcid.org/0000-0002-8458-3770
Mark A Gregory http://orcid.org/0000-0003-4631-6468

Keywords

Mobile Ad hoc Networks, Packet Storage Time Attack, Artificial Immune System, Security, Danger Signal, Pathogen Associated Molecular Pattern

Abstract

The dynamic distributed topology of a Mobile Ad Hoc Network (MANET) provides a number of challenges associated with decentralised infrastructure where each node can act as the source, destination and relay for traffic. MANET’s are a suitable solution for distributed regional, military and emergency networks. MANETs do not utilise fixed infrastructure except where connectivity to carrier networks is required and MANET nodes provide the transmission capability to receive, transmit and route traffic from a sender node to the destination node. In this paper, we present a Packet Storage Time (PST) routing attack where an attacking node modifies its storage time and thereby does not forward packets to the intended recipient nodes. In the Human Immune System, cells are able to distinguish between a range of issues including foreign body attacks as well as cellular senescence. This paper presents an approach using Artificial Immune System based Danger signal (DS) and Pathogen Associated Molecular Pattern (PAMP) signal to identify a PST routing attack.

Downloads

Download data is not yet available.
Abstract 553 | PDF Downloads 23 HTML Downloads 0

References

Abdelhaq, M; Hassan, R; Alsaqour, R. (2011). Using dendritic cell algorithm to detect the resource consumption attack over MANET. Paper presented at the International Conference on Software Engineering and Computer Systems. https://link-springer-com.ezproxy.lib.rmit.edu.au/chapter/10.1007/978-3-642-22203-0_38

Abdelhaq, M; Hassan, R; Ismail, M; Alsaqour, R; Israf, D. (2011). Detecting sleep deprivation attack over manet using a danger theory-based algorithm. International Journal of New Computer Architectures and their Applications (IJNCAA), 1(3), 534-541. http://sdiwc.net/digital-library/detecting-sleep-deprivation-attack-over-manet-using-a-danger-theorybased-algorithm.html

Abdelhaq, M; Hassan, R; Ismail, M; Israf, D. (2011). Detecting resource consumption attack over MANET using an artificial immune algorithm. Research Journal of Applied Sciences, Engineering and Technology, 3(9), 1026-1033. http://www.airitilibrary.com/Publication/alDetailedMesh?docid=20407467-201109-201411110031-201411110031-1026-1033

Adjih, C; Raffo, D; Muhlethaler, P. (2005). Attacks against OLSR: Distributed key management for security. Paper presented at the 2005 OLSR Interop and Workshop. https://www.researchgate.net/publication/242417041_Attacks_Against_OLSR_Distributed_Key_Management_for_Security

Bala, A; Bansal, M; Singh, J. (2009). Performance analysis of MANET under blackhole attack. Paper presented at the Networks and Communications, 2009. NETCOM'09. First International Conference on. http://ieeexplore.ieee.org.ezproxy.lib.rmit.edu.au/abstract/document/5384021/?reload=true

Bandyopadhyay, A; Vuppala, S; Choudhury, P. (2011). A simulation analysis of flooding attack in MANET using NS-3. Paper presented at the Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011. 2nd International Conference on. http://ieeexplore.ieee.org.ezproxy.lib.rmit.edu.au/abstract/document/5940916/

Choi, S; Kim, D.-y; Lee, D.-h; Jung, J.-i. (2008). WAP: Wormhole attack prevention algorithm in mobile ad hoc networks. Paper presented at the Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC'08. IEEE International Conference on. http://ieeexplore.ieee.org.ezproxy.lib.rmit.edu.au/abstract/document/4545782/

Deng, H; Li, W; Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communications magazine, 40(10), 70-75. http://ieeexplore.ieee.org.ezproxy.lib.rmit.edu.au/abstract/document/1039859/

Giordano, S. (2002). Mobile ad hoc networks. Handbook of wireless networks and mobile computing,325-346 http://au.wiley.com/WileyCDA/WileyTitle/productCd-0471419028.html

Goyal, P; Parmar, V; Rishi, R. (2011). Manet: vulnerabilities, challenges, attacks, application. IJCEM International Journal of Computational Engineering & Management, 11 (2011), 32-37. http://skirubame.ucoz.com/_ld/0/29_Topic_1-MANET_v.pdf

Gu, F; Greensmith, J; Aickelin, U. (2011). The dendritic cell algorithm for intrusion detection. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2824971

Loo, J. H; Mauri, J. L; Ortiz, J. (2011). Mobile ad hoc networks: current status and future trends: CRC Press. http://www.crcnetbase.com.ezproxy.lib.rmit.edu.au/doi/pdf/10.1201/b11447-1

Mahajan, V; Natu, M; Sethi, A. (2008). Analysis of wormhole intrusion attacks in MANETS. Paper presented at the Military Communications Conference, 2008. MILCOM 2008. IEEE. http://ieeexplore.ieee.org.ezproxy.lib.rmit.edu.au/abstract/document/4753176/?reload=true

Mazhar, N; Farooq, M. (2008). A sense of danger: dendritic cells inspired artificial immune systems for MANET security. Proceedings of the 10th annual conference on Genetic and evolutionary computation. Atlanta, GA, USA, ACM: 63-70. http://dl.acm.org.ezproxy.lib.rmit.edu.au/citation.cfm?id=1389105

Mbarushimana, C; Shahrabi, A. (2007). Comparative study of reactive and proactive routing protocols performance in mobile ad hoc networks. Paper presented at the Advanced Information Networking and Applications Workshops, 2007, AINAW'07. 21st International Conference on http://ieeexplore.ieee.org.ezproxy.lib.rmit.edu.au/abstract/document/4224182/

Mistry, N; Jinwala, D. C; Zaveri, M. (2010). Improving AODV protocol against blackhole attacks. Paper presented at the Proceedings of the International Multi Conference of Engineers and Computer Scientists. http://www.iaeng.org/publication/IMECS2010/IMECS2010_pp1034-1039.pdf

Perkins, C. E. (2008). Ad Hoc Networking 2001. Boston, Adison-Wesley. https://www.pearsonhighered.com/program/Perkins-Ad-Hoc-Networking-paperback/PGM75272.html

Yi, P; Dai, Z; Zhang, S; Zhong, Y. (2005). A new routing attack in mobile ad hoc networks. International Journal of Information Technology, 11(2), 83-94. http://www.intjit.org/cms/journal/volume/11/2/112_6.pdf

Most read articles by the same author(s)

1 2 3 4 > >>