Skip to main content

Relational Model and Improvised DSR Assisted Framework for Secure Wireless Communication

  • Conference paper
  • First Online:
Computing Science, Communication and Security (COMS2 2023)

Abstract

Wireless communications offer a wide range of application with cost- effective communication establishment used in both commercial and domestic purpose. Owing to the presence of decentralized environment in Wireless Communications, it is quite a potential issue for monitoring the regular behavior of any wireless node while performing data propagation. The proposed study states that a wireless node in wireless communication environment plays a role of either normal node or malicious node with completely two different polarities of intention. However, the essential concern is mainly towards the selfish node, which is basically a normal node and owing to certain reason their behavior comes under suspicious zone. Irrespective of various forms of security attacks, identifying malicious node behavior is the most challenging security concern in wireless communication, which has yet not received a proper security solution. The proposed work presents a novel idea of security towards resisting adversarial impact of selfish node and routing mis-behavior present in wireless communications environment. The 1st-framework introduces a retaliation model where a novel role of node called as an auxiliary node is introduced to cater up the routing demands along with security demands. This module performs identification of a malicious routing mis-behavior based on evaluation carried out for the control message being propagated to the auxiliary node. The 2nd-framework further introduces a group friendly architecture where a probability-based modelling is carried out considering various possible set of actions to be executed by normal and selfish node. The model also presents a solution towards security threat prevention by encouraging the selfish node to perform cooperation. The study outcome is benchmarked with existing technique to see that proposed system offers a good balance between security performance and data transmission performance in wireless communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ilyas, M.: The Handbook of Ad Hoc Wireless Networks, CRC Press, Boca Raton (2017). ISBN: 781351836159, 1351836153

    Google Scholar 

  2. Mitra, P.: Recent Trends in Communication Networks, IntechOpen (2020). ISBN: 9781838805067, 1838805060

    Google Scholar 

  3. Westcott, D.A., Coleman, D.D.: CWNA Certified Wireless Network Administrator Study Guide (2021). ISBN: 9781119736332, 1119736331

    Google Scholar 

  4. Singh, N., Kaiwartya, O., Rao, R.S., Jain, V.: IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks IGI Global (2020). ISBN: 9781799825722, 1799825728

    Google Scholar 

  5. Kanellopoulos, D., Cuomo, F.: Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks, MDPI (2021). ISBN: 9783036511627, 3036511628

    Google Scholar 

  6. Yu, B., Hu, S.: Big Data Analytics for Cyber-Physical Systems, Springer, Cham (2020). https://doi.org/10.1007/978-3-030-43494-6, ISBN: 9783030434946, 303043494X

  7. Foschini, L., El Kamili, M. (eds.): ADHOCNETS 2020. LNICSSITE, vol. 345. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-67369-7

    Book  Google Scholar 

  8. Molinaro, A., Campolo, C., Scopigno, R.: Vehicular Ad Hoc Networks Standards, Solutions, and Research, Springer, Cham (2015). https://doi.org/10.1007/978-3-319-15497-8, ISBN: 9783319154985, 3319154982, 2015

  9. Khatib, M., Alsadi, S.: Wireless Mesh Networks-Security, Architectures and Protocols, Intech Open (2020). ISBN: 9781789852035, 178985203X

    Google Scholar 

  10. Chen, X.: Randomly Deployed Wireless Sensor Networks, Elsevier, Amsterdam (2020). ISBN: 9780128227718, 0128227710

    Google Scholar 

  11. Banerjee, I., Warnier, M., Brazier, F.M.T.: Self-organizing topology for energy-efficient ad-hoc communication networks of mobile devices. Complex Adapt. Syst. Model. 8(7), 1–21 (2020)

    Google Scholar 

  12. Islam, N., Shaikh, Z.A.: A Study of Research Trends and Issues in Wireless Ad Hoc Networks. IGI Globals-Handbook of Research on Progressive Trends in WIREL. COMMUN and Networking (2014)

    Google Scholar 

  13. Al Mojamed, M.: Integrating mobile ad hoc networks with the internet based on OLSR. Wirel. Commun. Mob. Comput. 2020, 1–16 (2020)

    Article  Google Scholar 

  14. Kumar, K., Verma, S.: A survey of the design and security mechanisms of the wireless networks and mobile adhoc networks. In: IOP Science-Open Access (2020).https://doi.org/10.13140/RG.2.2.31396.09609

  15. Rajeswari, A.R.: A Mobile Ad Hoc Network Routing Protocols: A Comparative Study”, IntechOpen-Open access peer-reviewed chapter (2020). https://doi.org/10.5772/intechopen.92550

  16. Boulaiche, M.: Survey of secure routing protocols for wireless ad hoc networks. Wireless Pers. Commun. 114(1), 483–517 (2020). https://doi.org/10.1007/s11277-020-07376-1

    Article  Google Scholar 

  17. Liu, W., Yu, M.: AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 63(9), 4585–4593 (2014). https://doi.org/10.1109/TVT.2014.2313180

    Article  Google Scholar 

  18. El-Semary, A.M., Diab, H.: BP-AODV: blackhole protected AODV routing protocol for MANETs based on chaotic map. IEEE Access 7, 95197–95211 (2019). https://doi.org/10.1109/ACCESS.2019.2928804

    Article  Google Scholar 

  19. Veeraiah, N., et al.: Trust aware secure energy efficient hybrid protocol for MANET. IEEE Access 9, 120996–121005 (2021). https://doi.org/10.1109/ACCESS.2021.3108807

    Article  MathSciNet  Google Scholar 

  20. Tu, J., Tian, D., Wang, Y.: An active-routing authentication scheme in MANET. IEEE Access 9, 34276–34286 (2021). https://doi.org/10.1109/ACCESS.2021.3054891

    Article  Google Scholar 

  21. Hassan, Z., Mehmood, A., Maple, C., Khan, M.A., Aldegheishem, A.: Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles. IEEE Access 8, 199618–199628 (2020). https://doi.org/10.1109/ACCESS.2020.3034327

    Article  Google Scholar 

  22. Khan, B.U.I., Anwar, F., Olanrewaju, R.F., Kiah, M.L.B.M., Mir, R.N.: Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs. IEEE Access 9, 61778–61792 (2021). https://doi.org/10.1109/ACCESS.2021.3073343

    Article  Google Scholar 

  23. Aggarwal, A., Gandhi, S., Chaubey, N.: Performance Analysis of AODV, DSDV and DSR in MANETs. ArXiv [Cs.NI] (2014). https://doi.org/10.48550/ARXIV.1402.2217

  24. Aggarwal, A., Gandhi, S., Chaubey, N., Jani, K.A.: Trust based secure on demand routing protocol (TSDRP) for MANETs. In: 2014 Fourth International Conference on Advanced Computing & Communication Technologies, pp. 432–438. IEEE (2014)

    Google Scholar 

  25. Aggarwal, A., Gandhi, S., Chaubey, N., Tada, N., Trivedi, S.: NDTAODV: Neighbor Defense Technique for Ad Hoc On-Demand Distance Vector (AODV) to mitigate flood attack in MANETS.ArXiv [Cs.NI] (2014). https://doi.org/10.48550/ARXIV.1405.6216

  26. Gandhi, S., Chaubey, N., Shah, P., Sadhwani, M.: Performance evaluation of DSR, OLSR and ZRP protocols in MANETs. In: 2012 International Conference on Computer Communication and Informatics, pp. 1–5. IEEE (2012)

    Google Scholar 

  27. Chaubey, N.K.: Security analysis of vehicular ad hoc networks (VANETs): a comprehensive study. Int. J. Secur. Appl. 10(5), 261–274 (2016). https://doi.org/10.14257/ijsia.2016.10.5.25

    Article  Google Scholar 

  28. Chaubey, N.K., Yadav, D.: A taxonomy of Sybil attacks in vehicular ad-hoc network (VANET). In IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks, pp. 174–190. Hershey, PA: IGI Global. (2020)

    Google Scholar 

  29. Chaubey, N.K., Yadav, D.: Detection of Sybil attack in vehicular ad hoc networks by ana- lyzing network performance. Int. J. Electr. Comput. Eng. (IJECE) 12(2), 1703 (2022). https://doi.org/10.11591/ijece.v12i2.pp1703-1710

    Article  Google Scholar 

  30. Rajani, K.C., Aishwarya, P., Meenakshi, S.R.: A review on multicasting routing protocols for mobile ad-hoc wireless networks. In: 2016 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, India, pp. 1045–1052 (2016). https://doi.org/10.1109/ICCSP.2016.7754309

  31. Rajani, K.C., Aishwarya, P.: Securing dynamic source routing by neighborhood monitoring in wireless adhoc network. Int. J. Adv. Comput. Sci. Appl. (IJACSA), 13(2) (2022). https://doi.org/10.14569/IJACSA.2022.0130243

  32. Rajani, K.C., Aishwarya, P., Manjunath, S.: Friendly group architecture for securely promoting selfish node cooperation in wireless ad-hoc network. Int. J. Adv. Comput. Sci. Appl. (IJACSA), 13(12) (2022). https://doi.org/10.14569/IJACSA.2022.0131263

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. C. Rajani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rajani, K.C., Manjunatha, S., Rakesh, V.S., Bhavana, P. (2023). Relational Model and Improvised DSR Assisted Framework for Secure Wireless Communication. In: Chaubey, N., Thampi, S.M., Jhanjhi, N.Z., Parikh, S., Amin, K. (eds) Computing Science, Communication and Security. COMS2 2023. Communications in Computer and Information Science, vol 1861. Springer, Cham. https://doi.org/10.1007/978-3-031-40564-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-40564-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-40563-1

  • Online ISBN: 978-3-031-40564-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics