Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks

被引:24
|
作者
Mohammadani, Khalid Hussain [1 ]
Memon, Kamran Ali [2 ]
Memon, Imran [3 ]
Hussaini, Nazish Nawaz [4 ]
Fazal, Hadiqua [3 ]
机构
[1] ISRA Univ, Dept Comp Sci, Hyderabad, Sindh, Pakistan
[2] Quaid E Awam Univ Engn Sci & Technol QUEST, Dept Elect Engn, Nawabshah, Pakistan
[3] Bahria Univ, Dept Comp Sci, Karachi Campus, Karachi 75300, Sindh, Pakistan
[4] Univ Sindh, Inst Math & Comp Sci, Jamshoro, Pakistan
关键词
Mobile ad hoc network; blackhole attack; carrier-sense multiple access; time-division multiple access; MAC PROTOCOL; ALGORITHM; ATTACK;
D O I
10.1177/1550147720921624
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks are the "spontaneous networks" which create a temporary network in any place and any time without using any extra fixed radio device of a full infrastructure network. Each device in this network works as a router to develop end-to-end communication connections and move independently in any direction. Mostly, mobile ad hoc networks use the IEEE 802.11b protocol with carrier-sense multiple access with collision avoidance medium access control layer protocol for sharing a common medium among the nodes simultaneously. Due to this distributed medium, the routing and medium access control layer of the mobile ad hoc network are prone to attacks. Among several attackers, blackhole attacker is the dangerous one which causes the loss of all data packets of devices in the network. Efficient medium access control protocol designs in this respect play a key role in determining channel utilization, network delay, and, more importantly, network security. In the proposed work, preamble information is used with time-division multiple access medium access control. The preamble time-division multiple access uses time synchronization for each time slot and does not assign much time to the blackhole attacker due to a fixed time slot. As a result, blackhole is not stable in all communications and such an attack is effectively defended. Simulation results show that, in the presence of the blackhole attacker, carrier-sense multiple access with collision avoidance has a high packet loss ratio and low network throughput as compared to the proposed preamble time-division multiple access.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Optimal time slot assignment for mobile ad hoc networks
    Sinha, K
    DISTRIBUTED COMPUTING - IWDC 2005, PROCEEDINGS, 2005, 3741 : 250 - 261
  • [2] An Efficient TDMA Slot Assignment Protocol in Mobile Ad Hoc Networks
    Kanzaki, Akimitsu
    Hara, Takahiro
    Nishio, Shojiro
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 891 - 895
  • [3] Spatial Reuse Time-Division Multiple Access for Broadcast Ad Hoc Underwater Acoustic Communication Networks
    Diamant, Roee
    Lampe, Lutz
    IEEE JOURNAL OF OCEANIC ENGINEERING, 2011, 36 (02) : 172 - 185
  • [4] Computational time-division and code-division channel access scheduling in ad hoc networks
    Department of Computer Science, University of California, Irvine , Irvine, CA, United States
    不详
    J. Netw., 2008, 8 (26-34): : 26 - 34
  • [5] A reliable QoS aware routing protocol with slot assignment for mobile ad hoc networks
    Wang, Neng-Chung
    Lee, Chao-Yang
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (06) : 1153 - 1166
  • [6] A Novel Multiple Access Protocol for Multihop Mobile Ad Hoc Networks
    Liu, Kai
    Cheng, Lianzhen
    Li, Hantao
    2008 14TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS, (APCC), VOLS 1 AND 2, 2008, : 909 - 913
  • [7] A multichannel reservation multiple access protocol for mobile ad hoc networks
    Liu, Kai
    Xing, Xiaoqin
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 3176 - 3180
  • [8] A secure incentive protocol for mobile ad hoc networks
    Zhang, Yanchao
    Lou, Wenjing
    Liu, Wei
    Fang, Yuguang
    WIRELESS NETWORKS, 2007, 13 (05) : 569 - 582
  • [9] A secure routing protocol for mobile ad hoc networks
    Du, D. (orchid_ee@sina.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [10] A secure incentive protocol for mobile ad hoc networks
    Yanchao Zhang
    Wenjing Lou
    Wei Liu
    Yuguang Fang
    Wireless Networks, 2007, 13 : 569 - 582