QoS-Aware Secure Routing Design for Wireless Networks with Selfish Jammers

Author(s):  
Yang Xu ◽  
Jia Liu ◽  
Yulong Shen ◽  
Xiaohong Jiang ◽  
Yusheng Ji ◽  
...  

Wireless networks are been used now-a-days. The most important fact about wireless network is it is mobile. It is thus used in many fields. One of the most important applications of wireless networks is Mobile Ad hoc NETwork (MANET) in which all the nodes work as both transmitter and receiver. MANETs are used in various fields like military, industry and emergency recovery. In order to provide adequate security against multiple attacks, the researchers are of the opinion that detection-based schemes should be incorporated in addition to traditionally used prevention techniques. Intrusion Detection and Prevention System (IDPS) is an effective defense mechanism that detects and prevents the security attacks at various levels. In recent work a polynomial key is employed for achieving useful key generation process and a polynomial is generated to compute the pair-wise key but it can be easily detected by the attacker so to improve the security in IDPS system, this work proposes the secure routing using Novel SEcured Keys Generation (NSEKG) against IDPS system. This proposal implements with two major keys: Secure Key (SeK) and Sharing key (ShK) creation is performed via the use of the User Property based Artificial Bee Colony (UPABC) algorithm and the frequency based behavior with certainty measurement on routing paths. These SeK and ShK keys creation with UPABC scheme exploits the encrypted value of the packets and the decryption determine whether the route reply is the result of a malicious node or not. The proposed NSEKG -IDPS system is very effective for communication attacks and needs to be gradually improved in order to detect multiple attacks. The performance is evaluated primarily in accordance with the subsequent metrics like Packet delivery ratio (PDR), Routing Overhead (RO), End-End-Delay (E2E), and Throughput


2009 ◽  
Vol 6 (4) ◽  
pp. 295-308 ◽  
Author(s):  
Bogdan Carbunar ◽  
Ioannis Ioannidis ◽  
Cristina Nita-Rotaru

Author(s):  
Ekata Mehul ◽  
Vikram Limaye

Securing a “Wireless Ad Hoc Network” (WAHN) is a major concern of network administrators. This is particularly so in case of the wireless networks due to their unique characteristics that varies from the traditional networks. For example, WAHN are vulnerable to internal as well as external attacks relatively easily, as compared with traditional networks, because of their ability to be accessible from anywhere within their range. Many solutions have been proposed in this area and they are also being continuously improved. Most of these solutions involve encryption; secure routing, quality of service, and so forth. However, each of these solutions is designed to operate in a particular situation; and it may fail to work successfully in other scenarios. This particular research work offers an alternate to improving the trustworthiness of the neighbourhood and securing the routing procedure. This security is achieved by dynamically computing the trust in neighbours and selecting the most secure route from the available ones for the data transfer. There is also a provision to detect the compromised node and virtually removing it from the network.


Sign in / Sign up

Export Citation Format

Share Document