A Cross-Layer based Hidden Marko(C-HMM) Model for Detection and Prevention of Malicious Attacks in Wireless Ad-hoc Networks

被引:0
|
作者
Jagadeesan, S. [1 ]
Manjula, R. [2 ]
Johnpeter, T. [3 ]
机构
[1] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci &, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] SRM Inst Sci & Technol, Dept Comp Technol, Coll Engn & Technol, Chennai, Tamil Nadu, India
[3] K Ramakrishnan Coll Engn, Dept Comp Sci & Engn, Trichy, India
关键词
blackhole attack; wormhole attack; machine learning; cross-layer; hidden marko model;
D O I
10.1109/ICMNWC52512.2021.9688414
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless mobile ad-hoc network is a self-configuring network which is used several mobile nodes. Mobile nodes are hop to hop communication between the nodes. In recent years' malicious attacks (blackhole and wormhole attack) have a serious thread in wireless communication. Blackhole attack and wormhole attack consume more energy, computing resource, network behaviour. In this paper a novel Cross-layer based Hidden Marko model(C-HMM) is proposed to detect and isolating a blackhole and wormhole attacks with high performance and less communication cost in wireless ad-hoc networks. The proposed algorithm C-HMM beats HMM in terms of packet loss ratio, delay, packet received and PDR. Experimental results are comparing with various parameters with help of ns2.34 simulation software.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] CROSS-LAYER DESIGN IN WIRELESS AD HOC AND SENSOR NETWORKS
    Tepe, Kemal E.
    SIGMA JOURNAL OF ENGINEERING AND NATURAL SCIENCES-SIGMA MUHENDISLIK VE FEN BILIMLERI DERGISI, 2010, 28 (02): : 66 - 73
  • [22] A cross-layer admission control framework for wireless ad-hoc networks using multiple antennas
    Hamdaoui, Bechir
    Ramanathan, Parameswaran
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (11) : 4014 - 4024
  • [23] A Cross-Layer Solution for Contention Control to Enhance TCP Performance in Wireless Ad-Hoc Networks
    Mast, Noor
    Khan, Shafiullah
    Uddin, M. Irfan
    Ghadi, Yazeed Yasin
    Alkahtani, Hend Khalid
    Mostafa, Samih M. M.
    IEEE ACCESS, 2023, 11 : 24875 - 24893
  • [24] Monotonic Signed Graph Approach for Cross-layer Congestion Control in Wireless Ad-hoc Networks
    Rath, Hemant Kumar
    Rajan, M. A.
    Balamuralidhar, P.
    2011 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2011, : 309 - 314
  • [25] Cross-layer design for double-string cooperative communications in wireless ad-hoc networks
    Sergi, S.
    Pancaldi, F.
    Vitetta, G. M.
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2011, 22 (08): : 471 - 486
  • [26] Cross-layer design for combining cooperative diversity with truncated ARQ in ad-hoc wireless networks
    Dai, L
    Letaief, KB
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 3175 - 3179
  • [27] Cross-layer designs for mitigating range attacks in ad hoc networks
    Mölsä, JVE
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2006, : 64 - 69
  • [28] A Cross-Layer and Optimized Privacy Method in Vehicular Ad-Hoc Networks
    Gongjun Yan
    Danda B. Rawat
    William Lindsey
    Wireless Personal Communications, 2017, 97 : 3331 - 3353
  • [29] Cross-Layer Architecture for Congestion Control in Vehicular Ad-Hoc Networks
    Puthal, Deepak
    Mir, Zeeshan Hameed
    Filali, Fethi
    Menouar, Hamid
    2013 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2013, : 887 - 892
  • [30] A survey on intrusion detection and prevention in wireless ad-hoc networks
    Khan, Khalid
    Mehmood, Amjad
    Khan, Shafiullah
    Khan, Muhammad Altaf
    Iqbal, Zeeshan
    Mashwani, Wali Khan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 105