Skip to main content

Power-Aware Architecture to Combat Intelligent Adaptive Attacks in Ad-Hoc Wireless Networks

  • Conference paper
Internet of Things, Smart Spaces, and Next Generation Networks and Systems (NEW2AN 2014)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8638))

Included in the following conference series:

  • 3174 Accesses

Abstract

The paper presents a novel technique to combat smart adaptive attacks in ad-hoc wireless networks where battery power and bandwidth are scarce. Nodes in ad-hoc wireless networks can assume the roles of transmitters, receivers, and/or routers in case they fall geographically between two communicating nodes. Malicious nodes deviate from the standard communications protocols to illegally maximize their share of the bandwidth and save their battery power for their own communication. When the malicious node has data packets to transmit, it increases the power of the transmitted signal to increase the throughput and reduce the delay and retransmission attempts. This behavior adversely affects the rest of the nodes that follow the standard communication protocols. When the malicious node receives a packet that is not destined to it, the malicious node forwards the packet with very low transmission power level to save power and in this case, the packet reaches the next hop without enough signal strength to be decoded correctly. In this type of sophisticated attacks, malicious nodes deal with the control packets according to the standards so it keeps itself visible inside the network in case there are packets destined to it. Our end-to-end algorithm detects and isolates those types of attackers to maintain the resiliency of the network against the malicious behavior.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://tools.ietf.org/html/rfc4728

  2. Deng, H., Li, W., Dharma, P.: Agrawal: Routing Security in Ad Hoc Networks. IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks 40(10), 70–75 (2002)

    Google Scholar 

  3. Tseng, et al.: A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Computing and Information Sciences 1, 4 (2011)

    Article  Google Scholar 

  4. Balakrishnan, K., Deng, J., Varshney, P.K.: TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks. In: Proc. IEEE Wireless Comm. and Networking Conf. (WCNC 2005) (March 2005)

    Google Scholar 

  5. Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad Hoc Networks. Paper presented at the 5th European Personal Mobile Communications Conference, April 22-25, United Kingdom, Glasgow (2003)

    Google Scholar 

  6. Tamilselvan, L., Sankaranarayanan, V.: Prevention of Blackhole Attack in MANET. Paper presented at the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, August 27-30 (2007)

    Google Scholar 

  7. Djenouri, D., Badache, N.: Struggling Against Selfishness and Black Hole Attacks in MANETs. Wireless Communications & Mobile Computing 8(6), 689–704 (2008), doi:10.1002/wcm.v8:6

    Article  Google Scholar 

  8. Kozma, W., Lazos, L.: REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits. Paper presented at the Second ACM Conference on Wireless Network Security, Zurich, Switzerland, March 16-18 (2009)

    Google Scholar 

  9. Raj, P.N., Swadas, P.B.: DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV based MANET. International Journal of Computer Science 2, 54–59 (2009), doi: abs/0909.2371

    Google Scholar 

  10. Jaisankar, N., Saravanan, R., Swamy, K.D.: A Novel Security Approach for Detecting Black Hole Attack in MANET. Paper presented at the International Conference on Recent Trends in Business Administration and Information Processing, Thiruvananthapuram, India, March 26-27 (2010)

    Google Scholar 

  11. Mistry, N., Jinwala, D.C., Iaeng, Zaveri, M.: Improving AODV Protocol Against Blackhole Attacks. Paper presented at the International MultiConference of Engineers and Computer Scientists, Hong Kong, March 17-19 (2010)

    Google Scholar 

  12. Al-Shurman, M., Yoo, S.-M., Park, S.: Black Hole Attack in Mobile Ad Hoc Networks. Paper presented at the 42nd Annual ACM Southeast Regional Conference (ACM-SE 42), Huntsville, Alabama, April 2-3 (2004)

    Google Scholar 

  13. Su, M.-Y.: Prevention of Selective Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems. IEEE Computer Communications 34(1), 107–117 (2011), doi:10.1016/j.comcom.2010.08.007

    Article  Google Scholar 

  14. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proc. of the Sixth Annual International Conference on Mobile Computing and Networking, MobiCom (August 2000)

    Google Scholar 

  15. Sharma, S., Gupta, H.M., Dharmaraja, S.: EAGR: Energy Aware Greedy Routing scheme for wireless ad hoc networks. In: International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS 2008, June 16-18, pp. 122–129 (2008)

    Google Scholar 

  16. Singh, S., Woo, M., Raghavendra, C.: Power-Aware Routing in Mobile Ad Hoc Networks. In: MobiCom, pp. 181–190 (1998)

    Google Scholar 

  17. Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad Hoc WirelessNetworks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, ch. 5, pp. 153–181. Kluwer Academic Publishers (1996)

    Google Scholar 

  18. IEEE Standard 802.11 - Part 11: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY) specifications (1999)

    Google Scholar 

  19. http://www.OPNET.com

  20. US (Federal Communications Commission) FCC Part 15.247

    Google Scholar 

  21. Adapting Transmission Power for Optimal Energy Reliable Multi-hop Wireless Communication Suman Banerjee, Archan Misra. Wireless Optimization Workshop, WiOpt 2003, Sophia-Antipolis, France (March 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Soryal, J., Alnajjar, F.A., Saadawi, T. (2014). Power-Aware Architecture to Combat Intelligent Adaptive Attacks in Ad-Hoc Wireless Networks. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2014. Lecture Notes in Computer Science, vol 8638. Springer, Cham. https://doi.org/10.1007/978-3-319-10353-2_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10353-2_29

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10352-5

  • Online ISBN: 978-3-319-10353-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics