Abstract
Wireless communications offer a wide range of application with cost- effective communication establishment used in both commercial and domestic purpose. Owing to the presence of decentralized environment in Wireless Communications, it is quite a potential issue for monitoring the regular behavior of any wireless node while performing data propagation. The proposed study states that a wireless node in wireless communication environment plays a role of either normal node or malicious node with completely two different polarities of intention. However, the essential concern is mainly towards the selfish node, which is basically a normal node and owing to certain reason their behavior comes under suspicious zone. Irrespective of various forms of security attacks, identifying malicious node behavior is the most challenging security concern in wireless communication, which has yet not received a proper security solution. The proposed work presents a novel idea of security towards resisting adversarial impact of selfish node and routing mis-behavior present in wireless communications environment. The 1st-framework introduces a retaliation model where a novel role of node called as an auxiliary node is introduced to cater up the routing demands along with security demands. This module performs identification of a malicious routing mis-behavior based on evaluation carried out for the control message being propagated to the auxiliary node. The 2nd-framework further introduces a group friendly architecture where a probability-based modelling is carried out considering various possible set of actions to be executed by normal and selfish node. The model also presents a solution towards security threat prevention by encouraging the selfish node to perform cooperation. The study outcome is benchmarked with existing technique to see that proposed system offers a good balance between security performance and data transmission performance in wireless communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ilyas, M.: The Handbook of Ad Hoc Wireless Networks, CRC Press, Boca Raton (2017). ISBN: 781351836159, 1351836153
Mitra, P.: Recent Trends in Communication Networks, IntechOpen (2020). ISBN: 9781838805067, 1838805060
Westcott, D.A., Coleman, D.D.: CWNA Certified Wireless Network Administrator Study Guide (2021). ISBN: 9781119736332, 1119736331
Singh, N., Kaiwartya, O., Rao, R.S., Jain, V.: IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks IGI Global (2020). ISBN: 9781799825722, 1799825728
Kanellopoulos, D., Cuomo, F.: Recent Developments on Mobile Ad-Hoc Networks and Vehicular Ad-Hoc Networks, MDPI (2021). ISBN: 9783036511627, 3036511628
Yu, B., Hu, S.: Big Data Analytics for Cyber-Physical Systems, Springer, Cham (2020). https://doi.org/10.1007/978-3-030-43494-6, ISBN: 9783030434946, 303043494X
Foschini, L., El Kamili, M. (eds.): ADHOCNETS 2020. LNICSSITE, vol. 345. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-67369-7
Molinaro, A., Campolo, C., Scopigno, R.: Vehicular Ad Hoc Networks Standards, Solutions, and Research, Springer, Cham (2015). https://doi.org/10.1007/978-3-319-15497-8, ISBN: 9783319154985, 3319154982, 2015
Khatib, M., Alsadi, S.: Wireless Mesh Networks-Security, Architectures and Protocols, Intech Open (2020). ISBN: 9781789852035, 178985203X
Chen, X.: Randomly Deployed Wireless Sensor Networks, Elsevier, Amsterdam (2020). ISBN: 9780128227718, 0128227710
Banerjee, I., Warnier, M., Brazier, F.M.T.: Self-organizing topology for energy-efficient ad-hoc communication networks of mobile devices. Complex Adapt. Syst. Model. 8(7), 1–21 (2020)
Islam, N., Shaikh, Z.A.: A Study of Research Trends and Issues in Wireless Ad Hoc Networks. IGI Globals-Handbook of Research on Progressive Trends in WIREL. COMMUN and Networking (2014)
Al Mojamed, M.: Integrating mobile ad hoc networks with the internet based on OLSR. Wirel. Commun. Mob. Comput. 2020, 1–16 (2020)
Kumar, K., Verma, S.: A survey of the design and security mechanisms of the wireless networks and mobile adhoc networks. In: IOP Science-Open Access (2020).https://doi.org/10.13140/RG.2.2.31396.09609
Rajeswari, A.R.: A Mobile Ad Hoc Network Routing Protocols: A Comparative Study”, IntechOpen-Open access peer-reviewed chapter (2020). https://doi.org/10.5772/intechopen.92550
Boulaiche, M.: Survey of secure routing protocols for wireless ad hoc networks. Wireless Pers. Commun. 114(1), 483–517 (2020). https://doi.org/10.1007/s11277-020-07376-1
Liu, W., Yu, M.: AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Trans. Veh. Technol. 63(9), 4585–4593 (2014). https://doi.org/10.1109/TVT.2014.2313180
El-Semary, A.M., Diab, H.: BP-AODV: blackhole protected AODV routing protocol for MANETs based on chaotic map. IEEE Access 7, 95197–95211 (2019). https://doi.org/10.1109/ACCESS.2019.2928804
Veeraiah, N., et al.: Trust aware secure energy efficient hybrid protocol for MANET. IEEE Access 9, 120996–121005 (2021). https://doi.org/10.1109/ACCESS.2021.3108807
Tu, J., Tian, D., Wang, Y.: An active-routing authentication scheme in MANET. IEEE Access 9, 34276–34286 (2021). https://doi.org/10.1109/ACCESS.2021.3054891
Hassan, Z., Mehmood, A., Maple, C., Khan, M.A., Aldegheishem, A.: Intelligent detection of black hole attacks for secure communication in autonomous and connected vehicles. IEEE Access 8, 199618–199628 (2020). https://doi.org/10.1109/ACCESS.2020.3034327
Khan, B.U.I., Anwar, F., Olanrewaju, R.F., Kiah, M.L.B.M., Mir, R.N.: Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs. IEEE Access 9, 61778–61792 (2021). https://doi.org/10.1109/ACCESS.2021.3073343
Aggarwal, A., Gandhi, S., Chaubey, N.: Performance Analysis of AODV, DSDV and DSR in MANETs. ArXiv [Cs.NI] (2014). https://doi.org/10.48550/ARXIV.1402.2217
Aggarwal, A., Gandhi, S., Chaubey, N., Jani, K.A.: Trust based secure on demand routing protocol (TSDRP) for MANETs. In: 2014 Fourth International Conference on Advanced Computing & Communication Technologies, pp. 432–438. IEEE (2014)
Aggarwal, A., Gandhi, S., Chaubey, N., Tada, N., Trivedi, S.: NDTAODV: Neighbor Defense Technique for Ad Hoc On-Demand Distance Vector (AODV) to mitigate flood attack in MANETS.ArXiv [Cs.NI] (2014). https://doi.org/10.48550/ARXIV.1405.6216
Gandhi, S., Chaubey, N., Shah, P., Sadhwani, M.: Performance evaluation of DSR, OLSR and ZRP protocols in MANETs. In: 2012 International Conference on Computer Communication and Informatics, pp. 1–5. IEEE (2012)
Chaubey, N.K.: Security analysis of vehicular ad hoc networks (VANETs): a comprehensive study. Int. J. Secur. Appl. 10(5), 261–274 (2016). https://doi.org/10.14257/ijsia.2016.10.5.25
Chaubey, N.K., Yadav, D.: A taxonomy of Sybil attacks in vehicular ad-hoc network (VANET). In IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks, pp. 174–190. Hershey, PA: IGI Global. (2020)
Chaubey, N.K., Yadav, D.: Detection of Sybil attack in vehicular ad hoc networks by ana- lyzing network performance. Int. J. Electr. Comput. Eng. (IJECE) 12(2), 1703 (2022). https://doi.org/10.11591/ijece.v12i2.pp1703-1710
Rajani, K.C., Aishwarya, P., Meenakshi, S.R.: A review on multicasting routing protocols for mobile ad-hoc wireless networks. In: 2016 International Conference on Communication and Signal Processing (ICCSP), Melmaruvathur, India, pp. 1045–1052 (2016). https://doi.org/10.1109/ICCSP.2016.7754309
Rajani, K.C., Aishwarya, P.: Securing dynamic source routing by neighborhood monitoring in wireless adhoc network. Int. J. Adv. Comput. Sci. Appl. (IJACSA), 13(2) (2022). https://doi.org/10.14569/IJACSA.2022.0130243
Rajani, K.C., Aishwarya, P., Manjunath, S.: Friendly group architecture for securely promoting selfish node cooperation in wireless ad-hoc network. Int. J. Adv. Comput. Sci. Appl. (IJACSA), 13(12) (2022). https://doi.org/10.14569/IJACSA.2022.0131263
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Rajani, K.C., Manjunatha, S., Rakesh, V.S., Bhavana, P. (2023). Relational Model and Improvised DSR Assisted Framework for Secure Wireless Communication. In: Chaubey, N., Thampi, S.M., Jhanjhi, N.Z., Parikh, S., Amin, K. (eds) Computing Science, Communication and Security. COMS2 2023. Communications in Computer and Information Science, vol 1861. Springer, Cham. https://doi.org/10.1007/978-3-031-40564-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-40564-8_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-40563-1
Online ISBN: 978-3-031-40564-8
eBook Packages: Computer ScienceComputer Science (R0)