Skip to main content

On the Way of Protecting MANETs Against Security Threats: A Proactive Approach

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10978))

Abstract

MANETs are specially vulnerable against security attacks. For protecting them, security solutions are traditionally addressed by the so-called intrusion detection and response systems. Nevertheless, using reactive (response) solutions, once the attack is detected, rely in long attack mitigation times. In this work, we propose the use of relay node placement techniques as proactive security solutions. Preliminary experimentation demonstrates the suitability and feasibility of such approaches, not only in reducing the attack mitigation time but in replacing detection and response based traditional solutions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Figure elements legend: UN (blue circle), RN (red square), malicious node (inverted red triangle) and the optimized DRNS computed positions (green inverted triangle).

References

  1. Sánchez-Casado, L., Magán-Carrión, R., García-Teodoro, P., Díaz-Verdejo, J.E.: Defenses against packet dropping attacks in wireless multihop ad hoc networks. In: Khan, S., Lloret Mauri, J. (eds.) Security for Multihop Wireless Networks, pp. 377–400. CRC Press, Boca Raton (2014)

    Chapter  Google Scholar 

  2. Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16(1), 303–336 (2014)

    Article  Google Scholar 

  3. Inayat, Z., Gani, A., Anuar, N.B., Khan, M.K., Anwar, S.: Intrusion response systems: foundations, design, and challenges. J. Netw. Comput. Appl. 62, 53–74 (2016)

    Article  Google Scholar 

  4. Magán-Carrión, R., Camacho, J., García-Teodoro, P., Flushing, E.F., Di Caro, G.A.: DRNS: dynamical relay node placement solution. In: Demazeau, Y., Ito, T., Bajo, J., Escalona, M.J. (eds.) PAAMS 2016. LNCS (LNAI), vol. 9662, pp. 273–276. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39324-7_29

    Chapter  Google Scholar 

  5. Magán-Carrión, R., Camacho, J., García-Teodoro, P., Flushing, E.F., Di Caro, G.A.: A dynamical relay node placement solution for MANETs. Comput. Commun. 114(C), 36–50 (2017)

    Article  Google Scholar 

Download references

Acknowledgment

This work has been partially supported by Spanish Government-MINECO (Ministerio de Economía y Competitividad) and FEDER funds, through projects TIN2014-60346-R and TIN2014-60844-R.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roberto Magán-Carrión .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Magán-Carrión, R., Dorronsoro, B. (2018). On the Way of Protecting MANETs Against Security Threats: A Proactive Approach. In: Demazeau, Y., An, B., Bajo, J., Fernández-Caballero, A. (eds) Advances in Practical Applications of Agents, Multi-Agent Systems, and Complexity: The PAAMS Collection. PAAMS 2018. Lecture Notes in Computer Science(), vol 10978. Springer, Cham. https://doi.org/10.1007/978-3-319-94580-4_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-94580-4_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-94579-8

  • Online ISBN: 978-3-319-94580-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics