Skip to main content
Log in

RETRACTED ARTICLE: Design and implement a cross layer verification framework (CLVF) for detecting and preventing blackhole and wormhole attack in wireless ad-hoc networks for cloud environment

  • Published:
Cluster Computing Aims and scope Submit manuscript

This article was retracted on 07 December 2022

This article has been updated

Abstract

Various malicious activities are still making lot of problems in all kind of networks. Some of the malicious activities can be controlled and some can’t be, whereas controlling the malicious activities affects the network traffic or data should be detected and eliminated mainly. Malicious activities created in network layers affect the data and network traffic. In this paper controlling the blackhole and wormhole attacks is taken as the problem statement. To solve the problem this paper proposed a new framework for detecting and eliminating blackhole and wormhole attacks in wireless ad-hoc networks. To do that a cross layer verification framework is proposed and simulated in NS2 software to verify the efficiency. In order to evaluate the performance the obtained performance parameters are compared with existing approaches. The proposed framework can be provided as a add-on service support for cloud environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Change history

References

  1. Senthil Kumar, T., Suresh, A., Karumathil, A.: Improvised classification model for cloud based authentication using keystroke dynamics. Frontier and innovation in Future Computing and Communications Lecture Notes In Electrical Engineering (LNEE) 301, 885–893 (2014)

    Article  Google Scholar 

  2. Zhang, S., Zhang, S.F., Chen, X.B., Huo, X. Z.: Cloud computing research and development trend. In Proceedings of the 2010 Second International Conference on Future Networks (ICFN ’10). IEEE Computer Society, Washington, DC, pp. 93–97. https://doi.org/10.1109/ICFN.2010.58

  3. Peng, J.J., Zhang, X.J., Lei, Z., Zhang, B.F., Zhang, W., Li, Q.: Comparison of several cloud computing platforms. Second International Symposium on Information Science and Engineering (ISISE ’09). IEEE Computer Society, Washington, DC, pp. 23–27 (2009) https://doi.org/10.1109/ISISE.2009.94

  4. Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Comput. 35, 53–57 (2002)

    Article  Google Scholar 

  5. Singh, R., Singh, P., Duhan, M.: An effective implementation of security based algorithmic approach in mobile adhoc networks. Hum-Cent. Comput. Inform. Sci. 4(1), 7 (2014)

    Article  Google Scholar 

  6. Zhang, Y., Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Mobile Computing and Networking, pp. 275–283 (2000)

  7. Jyothirmai, P., Raj, J.S.: Secure interoperable architecture construction for overlay networks. Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on IEEE (2015)

  8. Raj, J.S., Smys, S., Josemin Bala, G.: Performance improvement in manets: a cross layer approach via TCP. Int. J. Recent Trends Eng. Technol. 2(1), 1 (2009)

    Google Scholar 

  9. AbdRazak S., Furnell S., Clarke N., Brooke P.: A two-tier intrusion detection system for mobile ad hoc networks: a friend approach. In: Proceedings of Lecture Notes in Computer Science, Berlin, pp. 590–595 (2006)

  10. Michiardi, P., Molva, R.: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Communication and Multimedia Security Conference (2002)

  11. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking pp. 255–265 (2000)

  12. Kachirski, O., Guha, R.K.: Effective intrusion detection using multiple sensors in wireless ad hoc networks. In: HICSS, p. 57 (2003)

  13. Rao R., Kesidis, G.: Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited. In: GLOBECOM 2003-IEEE Global Telecommunications Conference, vol. 22(1), pp. 2957–2961 (2003)

  14. Liu, Y., Li, Y., Man, H.: A distributed cross-layer intrusion detection system for ad hoc networks. In: SecureComm (2005)

  15. Jyothirmai, P., Raj, J.S., Smys, S.: Secured self organizing network architecture in wireless personal networks. Wirel. Person. Commun. 96(4), 5603–5620 (2017)

    Article  Google Scholar 

  16. McCanne, S., Floyd, S.: Network simulator version 2. http://www.isi.edu/nsnam/ns

  17. Poojary, N., Krishnamurthy, S.V., Dao,S.: Medium access control in a network of ad hoc nodes with heterogeneous transmit power capabilities (Helisinki) (2001)

  18. Udaya Suriya Rajkumar, D., Vayanaperumal, R.: A leader based intrusion detection system for preventing intruder in heterogeneous wireless sensor network. IBSS, IEEE (2015) https://doi.org/10.1109/IBSS.2015.7456671

  19. Brodkin, J.: Gartner: seven cloud-computing security risks. Infoworld 2008, 1–3 (2008)

    Google Scholar 

  20. Catteddu, D.: Cloud Computing: Benefits, Risks and Recommendations for Information Security, pp. 17–17. Springer, Heidelberg (2010)

  21. Kotz, D., Newport, C., Gray, R., Liu, J., Yuan, Y., Elliott, C.: Experimental evaluation of wireless simulation Assumptions. In: Proceeding of the ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless & Mobile System (MSWiM), pp. 78–82 (2004)

  22. Zhang, S., Zhang, S.F., Chen, X.B., Huo, X.Z.: The comparison between cloud computing and grid computing. International Conference on Computer Application and System Modeling (ICCASM), pp. V11-72–V11-75 (2010)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Jagadeesan.

Additional information

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s10586-022-03868-w"

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jagadeesan, S., Parthasarathy, V. RETRACTED ARTICLE: Design and implement a cross layer verification framework (CLVF) for detecting and preventing blackhole and wormhole attack in wireless ad-hoc networks for cloud environment. Cluster Comput 22 (Suppl 1), 299–310 (2019). https://doi.org/10.1007/s10586-018-1825-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-1825-8

Keywords

Navigation