Abstract
In this contemporary world, mobile ad-hoc networks emerges as an imperative field in computer science. An application of MANET is vehicular networks (VANET) which gives its maximum coverage towards real time actions like vehicular traffic control etc. A mobile ad-hoc network is a network where nodes are movable in state, infrastructure-less, self-configuring and self-repairing from the disconnected links between the nodes. The network topology changes according to the nodes’ factors. Due to lack of monitoring, any node can join the network topology based on RF level or distance coverage. Any unauthorised node enters the network and involves in communication without any legalized acceptance from the network. In case of any unusual entry of the node will results in degrade in the network efficiency factors. Anyhow it will ruin the entire network performance and makes to split the topology which causes overhead to start from the initial process. In this paper, we combined one or more attacks by deploying one or more suspicious nodes into the network. By analysing the results from simulation various performance factors are compared based on several test cases. An authorised agent node is placed in the network and issues secret key value to the mobile nodes. Analysis form the results are calculated using regression and deviation method. This paper also gives the analysis of various combinatorial ways of deployed attacks in the network.













Similar content being viewed by others
References
Pitchai, R., Jayashri, S., Raja, J.: Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. J. Wirel. Pers. Commun 90(2), 947–960 (2016)
Kaur, N., Kad, S.: A review on security related aspects in vehicular adhoc networks. Procedia Comput. Sci. 78, 387–394 (2016)
Ghate, P.V., Pati, H.K.: Collaborative distributed communication in heterogeneous environments: a comprehensive survey. J. Netw. Comput. Appl. 61, 1–20 (2016)
Peng, M., et al.: Black hole search in computer networks: State-of-the-art, challenges and future directions. J. Parallel Distrib. Comput. 88, 1–15 (2016)
Arora, S.K., Monga, H.: Performance evaluation of MANET on the basis of knowledge base algorithm. Optik Int. J. Light Electron Opt. 127(18), 7283–7291 (2016)
Xia, H., et al.: Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw. 11(7), 2096–2114 (2013)
Kushwaha, A., et al.: A novel selective encryption method for securing text over mobile ad hoc network. Procedia Comput. Sci. 79, 16–23 (2016)
Joshi, P., et al.: Security issues in routing protocols in MANETs at network layer. Procedia Comput. Sci. 3, 954–960 (2011)
Sarika, S.: Security issues in mobile ad-hoc networks. Procedia Comput. Sci. 92, 329–335 (2016)
Moltchanov, D., et al.: Distance distributions in random networks. Ad Hoc Netw. 10(6), 1146–1166 (2012)
Di Pietro, R., Guarino, S., Verde, N.V., Domingo-Ferrer, J.: Security in wireless ad-hoc networks—a survey. Comput. Commun. 51, 1–20 (2014)
Veerarajan, T.: Probability, Statistics and Random Processes with Queueing Theory and Queueing Networks, 4th edn. McGraw-Hill, New York (2008)
Shi, B., Wang, P., Jiang, J., Liu, R.: Applying high-frequency surrogate measurements and a wavelet-ANN model to provide early warnings of rapid surface water quality anomalies. Sci. Total Environ. 610, 1390–1399 (2018)
Gasser, C., Bucher, C.: An optimized strategy for using asymptotic sampling for reliability analysis. Struct. Saf. 71, 33–40 (2018)
Zhang, Y.-J., Sun, Y.-F., Huang, J.: Energy efficiency, carbon emission performance, and technology gaps: evidence from CDM project investment. Energy Policy 115, 119–130 (2018)
Dhaka, A.: Gray and black hole attack identification using control packets in MANETs. Procedia Comput. Sci. 54, 83–91 (2015)
Chavan, A.A.: Performance analysis of AODV and DSDV routing protocol in MANET and modifications in AODV against black hole attack. Procedia Comput. Sci. 79, 835–844 (2016)
Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11, 38–47 (2004)
Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. J. Ad hoc Netw. 6, 32–46 (2008)
Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Commun. Mag. 40, 70–75 (2002)
Liu, A., et al.: On throughput capacity for a class of buffer-limited MANETs. Ad Hoc Netw. 37(Part 2), 354–367 (2016)
Rajkumar, B., Narsimha, G.: Trust based certificate revocation for secure routing in MANET. Procedia Comput. Sci. 92, 431–441 (2016)
Cho, J.-H., et al.: Trust threshold based public key management in mobile ad hoc networks. Ad Hoc Netw. 44, 58–75 (2016)
Conti, M., et al.: From MANET to people-centric networking: milestones and open research challenges. Comput. Commun. 71, 1–21 (2015)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Gayathri, V.M., Nedunchelian, R. Mitigating combinatorial attacks in node to node communication using high level security measures based on analysis of efficiency factor through regression and deviation. Cluster Comput 22 (Suppl 1), 165–176 (2019). https://doi.org/10.1007/s10586-018-2004-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-2004-7