A Cross-Layer based Hidden Marko(C-HMM) Model for Detection and Prevention of Malicious Attacks in Wireless Ad-hoc Networks

被引:0
|
作者
Jagadeesan, S. [1 ]
Manjula, R. [2 ]
Johnpeter, T. [3 ]
机构
[1] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci &, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] SRM Inst Sci & Technol, Dept Comp Technol, Coll Engn & Technol, Chennai, Tamil Nadu, India
[3] K Ramakrishnan Coll Engn, Dept Comp Sci & Engn, Trichy, India
关键词
blackhole attack; wormhole attack; machine learning; cross-layer; hidden marko model;
D O I
10.1109/ICMNWC52512.2021.9688414
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless mobile ad-hoc network is a self-configuring network which is used several mobile nodes. Mobile nodes are hop to hop communication between the nodes. In recent years' malicious attacks (blackhole and wormhole attack) have a serious thread in wireless communication. Blackhole attack and wormhole attack consume more energy, computing resource, network behaviour. In this paper a novel Cross-layer based Hidden Marko model(C-HMM) is proposed to detect and isolating a blackhole and wormhole attacks with high performance and less communication cost in wireless ad-hoc networks. The proposed algorithm C-HMM beats HMM in terms of packet loss ratio, delay, packet received and PDR. Experimental results are comparing with various parameters with help of ns2.34 simulation software.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Game model for detecting cross-layer attacks in wireless ad hoc networks
    Wang J.
    Liu X.
    Jiang S.
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2022, 44 (01): : 114 - 121
  • [2] CROSS-LAYER OPTIMIZATION OF WIRELESS FADING AD-HOC NETWORKS
    Gatsis, Nikolaos
    Ribeiro, Alejandro
    Giannakis, Georgios B.
    2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, : 2353 - +
  • [3] Malicious node detection in ad-hoc wireless networks
    Griswold, RL
    Medidi, S
    DIGITAL WIRELESS COMMUNITCATIONS V, 2003, 5100 : 40 - 50
  • [4] Ad-hoc networks: new detection and prevention approach to malicious attacks using Honeypot
    Mondal A.
    Goswami R.T.
    International Journal of Cloud Computing, 2023, 12 (2-4) : 308 - 323
  • [5] A cross-layer approach to detect jamming attacks in wireless ad hoc networks
    Thamilarasu, Geethapriya
    Mishra, Sumita
    Sridhar, Ramalingam
    MILCOM 2006, VOLS 1-7, 2006, : 2586 - +
  • [6] Stasis Trap: Cross-Layer Stealthy Attacks in Wireless Ad Hoc Networks
    Bian, Kaigui
    Park, Jung-Min
    Chen, Ruiliang
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [7] A cross-layer approach to enhance TCP fairness in wireless ad-hoc networks
    Boggia, G
    Camarda, P
    Grieco, LA
    Mastrocristino, T
    Tesoriere, G
    2ND INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATIONS SYSTEMS 2005 (ISWCS 2005), 2005, : 498 - 502
  • [8] A Cross-Layer Framework for Video Streaming over Wireless Ad-Hoc Networks
    Nikoupour, Mohammad
    Nikoupour, Ali
    Dehghan, Mehdi
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 347 - +
  • [9] Cross-Layer Combination of Cooperative HARQ with AMC in Wireless Ad-hoc Networks
    Shi, Feijin
    Yuan, Dongfeng
    2008 11TH IEEE SINGAPORE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), VOLS 1-3, 2008, : 896 - 900
  • [10] A MAC-PHY cross-layer protocol for wireless ad-hoc networks
    Liu, Feilu
    Korakis, Thanasis
    Tao, Zhifeng
    Panwar, Shivendra
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 1792 - +