Malicious Route Defending Reliable-Data Transmission Scheme for Multi Path Routing in Wireless Network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
Malicious Route Defending Reliable-Data Transmission Scheme for Multi Path Routing in Wireless Network

Authors: S. Raja Ratna, R. Ravi

Abstract:

Securing the confidential data transferred via wireless network remains a challenging problem. It is paramount to ensure that data are accessible only by the legitimate users rather than by the attackers. One of the most serious threats to organization is jamming, which disrupts the communication between any two pairs of nodes. Therefore, designing an attack-defending scheme without any packet loss in data transmission is an important challenge. In this paper, Dependence based Malicious Route Defending DMRD Scheme has been proposed in multi path routing environment to prevent jamming attack. The key idea is to defend the malicious route to ensure perspicuous transmission. This scheme develops a two layered architecture and it operates in two different steps. In the first step, possible routes are captured and their agent dependence values are marked using triple agents. In the second step, the dependence values are compared by performing comparator filtering to detect malicious route as well as to identify a reliable route for secured data transmission. By simulation studies, it is observed that the proposed scheme significantly identifies malicious route by attaining lower delay time and route discovery time; it also achieves higher throughput.

Keywords: Attacker, Dependence, Jamming, Malicious.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1337967

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1711

References:


[1] G. Lin, and G. Noubir, “On link layer denial of service in data wireless LANs”, Wireless Communications and Mobile Computing, vol. 5, pp. 273–284, May 2004.
[2] Y. Xuan, Y. Shen, N. P. Nguyen, and M. T. Thai, “A trigger identification service for defending reactive jammers in WSN”, IEEE Transactions on Mobile Computing, vol. 11, pp. 793 – 806, May 2012
[3] H. Nguyen, T. Pongthawornkamol, and K. Nahrstedt, “Alibi framework for identifying reactive jamming nodes in wireless lan”, IEEE Globecom Telecommunication Conference, pp. 1-6, Dec. 2011.
[4] C. Li, H. Dai, L. Xiao, and P. Ning, ”Communication efficiency of antijamming broadcast in large-scale multi-channel wireless networks”, IEEE Transactions on Signal Processing, vol. 60, pp. 5281 - 5292 Oct. 2012.
[5] K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy, “Denial of service attacks in wireless networks: the case of jammers”, IEEE Communications surveys & tutorials, vol. 13, pg. 245-257, May 2011.
[6] G. Noubir, and G. Lin, “Low-power DoS attacks in data wireless lans and countermeasures”, Mobile Computing and Communications Review, vol. 7, pp. 29–30, July 2003.
[7] H. Mustafa, X. Zhang, Z. Liu, W. Xu, and A. Perrig, ”Jamming-resilient multipath routing”, IEEE Transactions on Dependable and Secure Computing, vol. 9, pp. 852-864, Nov. 2012.
[8] S. R. Ratna, R. Ravi, and B. Shekhar, “An Intelligent Approach based on Neuro- Fuzzy Detachment Scheme for Preventing jamming Attack in Wireless Networks”, Journal of Intelligent and fuzzy logic, Doi 10.3233/IFS-141363. ISSN 1064-1246(Print). 1875-8967 Online (in press), Sep. 2014.
[9] Y. S. Shiu, S. Y. Chang, H.C. Wu, S.C.H. Huang, and H. H. Chen, “Physical layer security in wireless networks: a tutorial”, IEEE Wireless Communications, vol. 18, pp. 66-74, April 2011.
[10] Q. Peng, P. C. Cosman, and L. B. Milstein, “Spoofing or Jamming: Performance Analysis of a Tactical Cognitive Radio Adversary”, IEEE Journal of selected areas in communications, vol. 29, pp. 903-911, April 2011.
[11] E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa, “On the performance of IEEE 802.11 under jamming”, Proc. IEEE Conference on Computer Communications INFOCOM, pp 1265– 1273, Apr. 2008.
[12] W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming Sensor Networks: Attack and Defense Strategies“, IEEE Networks Special Issue on Sensor Networks, vol.20, pp. 41-47, May 2006.
[13] E. Setton, X. Zhu, and B. Girod, “Congestion-Optimized Multi-Path Streaming of Video over Ad Hoc Wireless Networks,” Proc. IEEE Int’l Conf. Multimedia and Expo (ICME), vol. 3, pp. 1619 – 1622, June 2004.
[14] A. Tsirigos, and Z. J. Haas, “Analysis of Multipath Routing part I: The Effect on the Packet Delivery Ratio,” Proc. IEEE Trans. Wireless Comm., vol. 3, pp. 136-146, Jan. 2004.
[15] L. Zhang, Z. Zhao, Y. Shu, and Lei Wang, “Load Balancing of Multipath Source Routing in Ad Hoc Networks,” Proc. IEEE International Conference on Communications, vol. 5, pp. 3197 – 3201, 2002.
[16] M. Wilhelm, I. Martinovic, J. Schmitt, and V. Lenders,”Reactive jamming in wireless networks: How realistic is the threat?”, In Proceedings of WiSec, pp. 47-52, 2011.
[17] W. Xu, W. Trappe, Y. Zhang, and T. Wood, ”The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks”, MobiHoc 05, pp. 46-57, May 2005.
[18] A. Proano, and L. Lazos,” Packet-Hiding Methods for Preventing Selective Jamming Attacks”, IEEE Transactions on dependable and secure computing, vol. 9, pp. 101 - 114, Jan. 2012.
[19] A. Richa, C. Scheideler, S. Schmid, and J. Zhang,”An Efficient and Fair MAC Protocol Robust to Reactive Interference”, IEEE/ACM Transactions on Networking, vol. 21, pp. 760 - 771, June 2013.
[20] L. Wang, and A. M. Wyglinski, “A Combined Approach for Distinguishing Different Types of Jamming Attacks against Wireless Networks”, IEEE Pacific Rim (PacRim) Conference on Communications, Computers and Signal Processing, pp. 8019-814, Aug. 2011.
[21] H. Nguyen, T. Pongthawornkamol, and K. Nahrstedt,”Alibi framework for identifying reactive jamming nodes in wireless LAN”, IEEE Global Telecommunication Conference (GLOBECOM 2011), pp. 1-6, Dec. 2011.
[22] K. Pelechrinis, M. IIiofotou, and S. Krishnamurthy, “A measurement – Driven Anti-jamming System for 802.11 Networks”, IEEE/ ACM Transactions on Networking, vol. 19, pp. 1208-1222, Aug. 2011.