A Cross-Layer based Hidden Marko(C-HMM) Model for Detection and Prevention of Malicious Attacks in Wireless Ad-hoc Networks

被引:0
|
作者
Jagadeesan, S. [1 ]
Manjula, R. [2 ]
Johnpeter, T. [3 ]
机构
[1] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci &, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] SRM Inst Sci & Technol, Dept Comp Technol, Coll Engn & Technol, Chennai, Tamil Nadu, India
[3] K Ramakrishnan Coll Engn, Dept Comp Sci & Engn, Trichy, India
关键词
blackhole attack; wormhole attack; machine learning; cross-layer; hidden marko model;
D O I
10.1109/ICMNWC52512.2021.9688414
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless mobile ad-hoc network is a self-configuring network which is used several mobile nodes. Mobile nodes are hop to hop communication between the nodes. In recent years' malicious attacks (blackhole and wormhole attack) have a serious thread in wireless communication. Blackhole attack and wormhole attack consume more energy, computing resource, network behaviour. In this paper a novel Cross-layer based Hidden Marko model(C-HMM) is proposed to detect and isolating a blackhole and wormhole attacks with high performance and less communication cost in wireless ad-hoc networks. The proposed algorithm C-HMM beats HMM in terms of packet loss ratio, delay, packet received and PDR. Experimental results are comparing with various parameters with help of ns2.34 simulation software.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] A cross-layer approach to collaborative beamforming for wireless ad hoc networks
    Dong, Lun
    Petropulu, Athina P.
    Poor, H. Vincent
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2008, 56 (07) : 2981 - 2993
  • [42] Cross-layer interaction in wireless Ad Hoc networks: A practical example
    Gauthier, Vincent
    Marot, Michel
    Becker, Monique
    RECENT ADVANCES IN MODELING AND SIMULATION TOOLS FOR COMMUNICATION NETWORKS AND SERVICES, 2007, : 105 - +
  • [43] Network planning in wireless ad hoc networks: A cross-layer approach
    Wu, Y
    Chou, PA
    Zhang, Q
    Jain, K
    Zhu, WW
    Kung, SY
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (01) : 136 - 150
  • [44] Enabling Differentiated QoS Based on Cross-Layer Optimization in Wireless Ad Hoc Networks
    Goudarzi, P.
    Ayatollahi, F.
    Ranjbar, M. R. Nezami
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 2013 - 2017
  • [45] A Routing Algorithm Based on Cross-layer Power Control in Wireless Ad Hoc Networks
    Huang, Haojun
    Hu, Guangmin
    Yu, Fucai
    2010 5TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2010,
  • [46] Establishment of Cross-Layer Trust Model for Ad Hoc Networks
    Bai, Yuan
    Bai, Zhongying
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1472 - +
  • [47] CLCP - A Distributed Cross-Layer Commit Protocol for Mobile Ad-hoc Networks
    Obermeier, Sebastian
    Boettcher, Stefan
    Kleine, Dominik
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, 2008, : 361 - 370
  • [48] Approach for PHY/MAC Cross-layer Design in Vehicular Ad-hoc Networks
    Joo, Jhihoon
    Lee, Hee Chang
    Han, Dong Seog
    2013 FIFTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2013, : 58 - 59
  • [49] Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks
    Hortos, William S.
    NEXT-GENERATION COMMUNICATION AND SENSOR NETWORKS 2007, 2007, 6773
  • [50] Cross-Layer Routing Using Cooperative Transmission in Vehicular Ad-hoc Networks
    Ding, Zhiguo
    Leung, Kin K.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (03) : 571 - 581