An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks

02/24/2020
by   Shahram Behzad, et al.
0

MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for the analysis of nodes behaviors and loss of specific offensive lines, this type of networks is not supportive against malicious nodes attacks. One of these attacks is black hole attack. In this attack, the malicious nodes absorb data packets and destroy them. Thus, it is essential to present an algorithm against the black hole attacks. This paper proposed a new approach, which improvement the security of DSR routing protocol to encounter the black hole attacks. This schema tries to identify malicious nodes according to nodes behaviors in a MANETs and isolate them from routing. The proposed protocol, called AIS-DSR (Artificial Immune System DSR) employ AIS (Artificial Immune System) to defend against black hole attacks. AIS-DSR is evaluated through extensive simulations in the ns-2 environment. The results show that AIS-DSR outperforms other existing solutions in terms of throughput, end-to-end delay, packets loss ratio and packets drop ratio.

READ FULL TEXT

page 1

page 2

page 3

page 4

04/14/2020

Addressing Packet Dropping Misbehavior using Metaheuristic Approach: A Survey

A Mobile Ad hoc Network can be said as a collection of mobile nodes, whi...
11/13/2018

Detection and Prevention Against RTS Attacks in Wireless LAN

Widely deployed wireless network devices use a shared medium to communic...
07/24/2017

Simple Countermeasures to Mitigate the Effect of Pollution Attack in Network Coding Based Peer-to-Peer Live Streaming

Network coding based peer-to-peer streaming represents an effective solu...
04/03/2019

Secured Approach Towards Reactive Routing Protocols Using Triple Factor in Mobile Adhoc Networks

Routing protocols are used to transmit the packets from the source to th...
04/29/2020

Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA Networks

We describe a new class of packet injection attacks called Man-on-the-Si...
06/14/2018

An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network

Coding Opportunistically (COPE) is a simple but very effective data codi...
12/28/2017

TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks

Wireless Mesh Networks (WMNs) have emerged as a key technology for the n...