Abstract
The paper presents a novel technique to combat smart adaptive attacks in ad-hoc wireless networks where battery power and bandwidth are scarce. Nodes in ad-hoc wireless networks can assume the roles of transmitters, receivers, and/or routers in case they fall geographically between two communicating nodes. Malicious nodes deviate from the standard communications protocols to illegally maximize their share of the bandwidth and save their battery power for their own communication. When the malicious node has data packets to transmit, it increases the power of the transmitted signal to increase the throughput and reduce the delay and retransmission attempts. This behavior adversely affects the rest of the nodes that follow the standard communication protocols. When the malicious node receives a packet that is not destined to it, the malicious node forwards the packet with very low transmission power level to save power and in this case, the packet reaches the next hop without enough signal strength to be decoded correctly. In this type of sophisticated attacks, malicious nodes deal with the control packets according to the standards so it keeps itself visible inside the network in case there are packets destined to it. Our end-to-end algorithm detects and isolates those types of attackers to maintain the resiliency of the network against the malicious behavior.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Deng, H., Li, W., Dharma, P.: Agrawal: Routing Security in Ad Hoc Networks. IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks 40(10), 70–75 (2002)
Tseng, et al.: A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Computing and Information Sciences 1, 4 (2011)
Balakrishnan, K., Deng, J., Varshney, P.K.: TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks. In: Proc. IEEE Wireless Comm. and Networking Conf. (WCNC 2005) (March 2005)
Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad Hoc Networks. Paper presented at the 5th European Personal Mobile Communications Conference, April 22-25, United Kingdom, Glasgow (2003)
Tamilselvan, L., Sankaranarayanan, V.: Prevention of Blackhole Attack in MANET. Paper presented at the 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, August 27-30 (2007)
Djenouri, D., Badache, N.: Struggling Against Selfishness and Black Hole Attacks in MANETs. Wireless Communications & Mobile Computing 8(6), 689–704 (2008), doi:10.1002/wcm.v8:6
Kozma, W., Lazos, L.: REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits. Paper presented at the Second ACM Conference on Wireless Network Security, Zurich, Switzerland, March 16-18 (2009)
Raj, P.N., Swadas, P.B.: DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV based MANET. International Journal of Computer Science 2, 54–59 (2009), doi: abs/0909.2371
Jaisankar, N., Saravanan, R., Swamy, K.D.: A Novel Security Approach for Detecting Black Hole Attack in MANET. Paper presented at the International Conference on Recent Trends in Business Administration and Information Processing, Thiruvananthapuram, India, March 26-27 (2010)
Mistry, N., Jinwala, D.C., Iaeng, Zaveri, M.: Improving AODV Protocol Against Blackhole Attacks. Paper presented at the International MultiConference of Engineers and Computer Scientists, Hong Kong, March 17-19 (2010)
Al-Shurman, M., Yoo, S.-M., Park, S.: Black Hole Attack in Mobile Ad Hoc Networks. Paper presented at the 42nd Annual ACM Southeast Regional Conference (ACM-SE 42), Huntsville, Alabama, April 2-3 (2004)
Su, M.-Y.: Prevention of Selective Black Hole Attacks on Mobile Ad Hoc Networks Through Intrusion Detection Systems. IEEE Computer Communications 34(1), 107–117 (2011), doi:10.1016/j.comcom.2010.08.007
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In: Proc. of the Sixth Annual International Conference on Mobile Computing and Networking, MobiCom (August 2000)
Sharma, S., Gupta, H.M., Dharmaraja, S.: EAGR: Energy Aware Greedy Routing scheme for wireless ad hoc networks. In: International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS 2008, June 16-18, pp. 122–129 (2008)
Singh, S., Woo, M., Raghavendra, C.: Power-Aware Routing in Mobile Ad Hoc Networks. In: MobiCom, pp. 181–190 (1998)
Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad Hoc WirelessNetworks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, ch. 5, pp. 153–181. Kluwer Academic Publishers (1996)
IEEE Standard 802.11 - Part 11: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY) specifications (1999)
US (Federal Communications Commission) FCC Part 15.247
Adapting Transmission Power for Optimal Energy Reliable Multi-hop Wireless Communication Suman Banerjee, Archan Misra. Wireless Optimization Workshop, WiOpt 2003, Sophia-Antipolis, France (March 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Soryal, J., Alnajjar, F.A., Saadawi, T. (2014). Power-Aware Architecture to Combat Intelligent Adaptive Attacks in Ad-Hoc Wireless Networks. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2014. Lecture Notes in Computer Science, vol 8638. Springer, Cham. https://doi.org/10.1007/978-3-319-10353-2_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-10353-2_29
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10352-5
Online ISBN: 978-3-319-10353-2
eBook Packages: Computer ScienceComputer Science (R0)