Characterization of Destructive Nodes and Analysing their Impact in Wireless Networks

Authors

  • Srinivas Aluvala KL University, Guntur, India
  • V. Srikanth

DOI:

https://doi.org/10.22399/ijcesen.726

Keywords:

Security, MANET, Destructive Node Characterization, Secure Communications, Protocol Dynamics

Abstract

Mobile Ad hoc Networks (MANETs) are being used to meet new requirements for efficiency and coordination in a variety of new public and residential contexts. Certain essential functions, including as resource management among network nodes, trust-based routing, and security for network maintenance, are not performed as well as they should because of the dynamic nature of wireless networks. Ad-hoc networks can also be attacked from different tiers of a network stack, and they are susceptible to secure communications. Destructive nodes have the ability to alter or reject routing parameters. They may also provide bogus routes in an attempt to intercept source data packets and pass them through. To handle the complexity arising from secure data exchange, some protocols have been developed. However, not all attack types can be detected and eliminated by a secure protocol in every scenario. Since security is not a feature that is built into MANETs, new secure wireless protocols need to concentrate on these issues. Thus, the analysis of destructive nodes' characteristics and effects on wireless networks in this research paper examined the behaviour of multiple attacks, their activities through neighbour selection, the establishment of paths from sources to destinations, and the dissemination of attack presence detection information to regular devices during path discovery and data transmission mechanisms. In order to categorize as legitimate, nodes must be constructed with safe transmission knowledge to provide trustworthy communication, validation, honesty, and privacy.

References

Qiang Huang, Hisashi Kobayashi, and Bede Liu. (2003). Modeling of Distributed Denial of Service Attacks Wireless Networks. IEEE Pacific Rim Conference on Communications Computers and Signal Processing (PACRIM 2003) (Cat. No.03CH37490), Victoria, BC, Canada, 1;41-44 doi: 10.1109/PACRIM.2003.1235714.

Lawan A. Mohammed and BijuIssac. (2006). Detailed DoS Attacks in Wireless Networks and Countermeasures, Int. J. Ad Hoc and Ubiquitous Computing, 2(3):157-166 DOI:10.1504/IJAHUC.2007.012417

Shafiullah Khan, Kok-Keong Loo1, Tahir Naeem, Mohammad AbrarKhan. (2008). Denial of Service Attacks and Challenges in Broadband Wireless Networks, IJCSNS International Journal of Computer Science and Network Security, 8(7);

Sreedhar. C, Dr. S. MadhusudhanaVerma and Dr. N. Kasiviswanath. (2010). Potential Security Attacks on Wireless Networks and Their Countermeasure, International journal of computer science & information Technology (IJCSIT) 2(5) DOI:10.5121/ijcsit.2010.2506

KuldeepTomar, and S.S Tyagi. (2014). Quantifying the Impact of Flood Attack on Transport Layer Protocol, International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.6.

Pratibha S. Gaikwad, Prof. S. P. Pingat. (2015). Preventing Jamming and Replay Attack in Wireless Applications, International Journal of Innovative Research in Computer and Communication Engineering, 3(7). DOI: 10.15680/ijircce.2015. 0307024

Megha Sharma, RajshreePurohit. (2015). Node Replication Attack Detection Technique in Wireless Sensor Network – A Survey, International Journal of Electrical, Electronics and Data Communication, 3(8).

H. Khosravi, R. Azmi, and M. Sharghi. (2016). Adaptive Detection of Hello Flood Attack in Wireless Sensor Networks, International Journal of Future Computer and Communication, 5(2). DOI:10.18178/ijfcc.2016.5.2.452

Devikarani Roy, ShilpaVerma. (2016). Vampire Attacks: Detection And Prevention, International Journal of Computer Techniques – 3(3).

JasmeenMangat, Er. JaspreetKaur (2017). Review on the Flooding Attacks in Mobile Ad Hoc Networks, International Journal of Advanced Research in Computer Science and Software Engineering, 7(4). 390-392. DOI:10.23956/ijarcsse/V7I4/0218

Chen, Hongsong; Meng, Caixia; Shan, Zhiguang; Fu, Zhongchuan; Bhargava, Bharat K. (2019). A novel Low-rate Denial of Service attack detection approach in ZigBee wireless sensor network by combining Hilbert-Huang Transformation and Trust Evaluation. IEEE Access, 7;32853–32866. doi:10.1109/ACCESS.2019.2903816

Gebrekiros Gebreyesus Gebremariam, J. Panda, S. Indu b. (2023). Secure localization techniques in wireless sensor networks against routing attacks based on hybrid machine learning mode. Alexandria Engineering Journal 82(1);82-100 https://doi.org/10.1016/j.aej.2023.09.064

Chen, Songlin; Pang, Zhibo; Wen, Hong; Yu, Kan; Zhang, Tengyue; Lu, Yueming. (2020). Automated Labeling and Learning for Physical Layer Authentication against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks. IEEE Transactions on Industrial Informatics, pp.1–11. doi:10.1109/TII.2020.2963962.

Nguyen, Van-Linh; Lin, Po-Ching; Hwang, Ren-Hung. (2019). Energy Depletion Attacks in Low Power Wireless Networks. IEEE Access, 7;51915–51932. doi:10.1109/ACCESS.2019.2911424

Bendale, Shailesh Pramod; Rajesh Prasad, Jayashree. (2018). [IEEE 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN) - Lonavala, India 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN) - Security Threats and Challenges in Future Mobile Wireless Networks. pp.146–150. doi:10.1109/GCWCN.2018.8668635.

Ahmad, Bilal; Jian, Wang; Ali, Zain Anwar; Tanvir, Sania; Khan, M. Sadiq Ali. (2018). Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network. Wireless Personal Communications, pp.1 –13. doi:10.1007/s11277-018-5721-6.

Yang, Guang; Dai, Lie; Si, Guannan; Wang, Shuxin; Wang, Shouqiang. (2019). Challenges and Security Issues in Underwater Wireless Sensor Networks. Procedia Computer Science, 147;210–216. doi:10.1016/j.procs.2019.01.22.

Wu, Xiaoling; Huang, Junjie; Ling, Jie; Shu, Lei. (2019). BLTM: Beta and LQI based Trust Model for Wireless Sensor Networks. IEEE Access, 4;1–12. doi:10.1109/ACCESS.2019.2905550

Aliady, Wateen A.; Al-Ahmadi, Saad A. (2019). Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks. IEEE Access, 7;84132–84141. doi:10.1109/ACCESS.2019.2924283

Ojha, RudraPratap; Srivastava, Pramod Kumar; Sanyal, Goutam; Gupta, Nishu (2020). Improved Model for the Stability Analysis of Wireless Sensor Network Against Malware Attacks. Wireless Personal Communications, pp.1–24. doi:10.1007/s11277-020-07809-x.

Zhang, Liyang; Restuccia, Francesco; Melodia, Tommaso; Puldlewski, Scott. (2018). Taming Cross-Layer Attacks in Wireless Networks: A Bayesian Learning Approach. IEEE Transactions on Mobile Computing, pp.1–14. doi:10.1109/TMC.2018.2864155

Islam, Mohammad NafisUl; Fahmin, Ahmed; Hossain, Md. Shohrab; Atiquzzaman, Mohammed. (2020). Denial-of-Service Attacks on Wireless Sensor Network and Defence Techniques. Wireless Personal Communications, pp.1–29. doi:10.1007/s11277-020-07776-3 .

Xie, Haomeng; Yan, Zheng; Yao, Zhen; Atiquzzaman, Mohammed. (2018). Data Collection for Security Measurement in Wireless Sensor Networks: A Survey. IEEE Internet of Things Journal, pp.1–22. doi:10.1109/JIOT.2018.2883403 .

Yuan, Yali; Huo, Liuwei; Wang, Zhixiao; Hogrefe, Dieter. (2018). Secure APIT Localization Scheme against Sybil Attacks in Distributed Wireless Sensor Networks. IEEE Access, pp.1–8. doi:10.1109/ACCESS.2018.2836898

Zhang, Ping; Wang, Shaokai; Guo, Kehua; Wang, Jianxin. (2018). A secure data collection scheme based on compressive sensing in wireless sensor networks. Ad Hoc Networks, 70;73–84. doi:10.1016/j.adhoc.2017.11.011

Zhao, Jin; Huang, Jifeng; Xiong, Naixue. (2019). An Effective Exponential-based Trust and Reputation Evaluation System in Wireless Sensor Networks. IEEE Access, 7;33859–33869. doi:10.1109/ACCESS.2019.2904544

Lyu, Chen; Zhang, Xiaomei; Liu, Zhiqiang; Chi, Chi-Hung. (2019). Selective Authentication based Geographic Opportunistic Routing in Wireless Sensor Networks for Internet of Things against DoS Attacks. IEEE Access, 7;31068–31082. doi:10.1109/ACCESS.2019.2902843

Kalidoss, Thangaramya; Rajasekaran, Logambigai; Kanagasabai, Kulothungan; Sannasi, Ganapathy; Kannan, Arputharaj. (2019). QoS Aware Trust Based Routing Algorithm for Wireless Sensor Networks. Wireless Personal Communications, pp.1-22 –. doi:10.1007/s11277-019-06788-y

Poongodi, T; Khan, Mohammed S.; Patan, Rizwan; Gandomi, Amir H.; Balusamy, Balamurugan. (2019). Robust Defence Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks. IEEE Access,.1-11. doi:10.1109/ACCESS.2019.2896001.

Weidong Fang; Wuxiong Zhang; Wei Yang; Zhannan Li; Weiwei Gao; Yinxuan Yang. (2021). Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks. Digital Communications and Networks,pp.1–3. doi:10.1016/j.dcan.2021.03.005.

El-Taj, H. (2024). A Secure Fusion: Elliptic Curve Encryption Integrated with LSB Steganography for Hidden Communication. International Journal of Computational and Experimental Science and Engineering, 10(3);434-460. https://doi.org/10.22399/ijcesen.382

Prasada, P., & Prasad, D. S. (2024). Blockchain-Enhanced Machine Learning for Robust Detection of APT Injection Attacks in the Cyber-Physical Systems. International Journal of Computational and Experimental Science and Engineering, 10(4);799-810. https://doi.org/10.22399/ijcesen.539

R, U. M., P, R. S., Gokul Chandrasekaran, & K, M. (2024). Assessment of Cybersecurity Risks in Digital Twin Deployments in Smart Cities. International Journal of Computational and Experimental Science and Engineering, 10(4);695-700. https://doi.org/10.22399/ijcesen.494

M. Swetha, & G. Appa Rao. (2024). Hybrid Ensemble Lightweight Cryptosystem for Internet of Medical Things Security. International Journal of Computational and Experimental Science and Engineering, 10(4);1528-1540. https://doi.org/10.22399/ijcesen.625

Sushma Polasi, & Hara Gopal Venkata Vajjha. (2024). Secure Drone Communications using MQTT protocol. International Journal of Computational and Experimental Science and Engineering, 10(4);1282-1289. https://doi.org/10.22399/ijcesen.685

Rahul SHANDILYA, & R.K. SHARMA. (2024). ProTECT: A Programmable Threat Evaluation and Control Unit for Zero Trust Networks. International Journal of Computational and Experimental Science and Engineering, 10(4);1372-1378. https://doi.org/10.22399/ijcesen.673

MOHAMED, N. N., Yulianta SIREGAR, Nur Arzilawati MD YUNUS, & Fazlina MOHD ALI. (2024). Modelling the Hybrid Security Approach for Secure Data Exchange: A Proof of Concept . International Journal of Computational and Experimental Science and Engineering, 10(4)1475-1485. https://doi.org/10.22399/ijcesen.344

Guven, M. (2024). A Comprehensive Review of Large Language Models in Cyber Security. International Journal of Computational and Experimental Science and Engineering, 10(3);507-516. https://doi.org/10.22399/ijcesen.469

C, A., K, S., N, N. S., & S, P. (2024). Secured Cyber-Internet Security in Intrusion Detection with Machine Learning Techniques. International Journal of Computational and Experimental Science and Engineering, 10(4);663-670. https://doi.org/10.22399/ijcesen.491

Kosaraju Chaitanya, & Gnanasekaran Dhanabalan. (2024). Precise Node Authentication using Dynamic Session Key Set and Node Pattern Analysis for Malicious Node Detection in Wireless Sensor Networks. International Journal of Computational and Experimental Science and Engineering, 10(4);1462-1474. https://doi.org/10.22399/ijcesen.613

Downloads

Published

2024-12-21

How to Cite

Srinivas Aluvala, & V. Srikanth. (2024). Characterization of Destructive Nodes and Analysing their Impact in Wireless Networks. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.726

Issue

Section

Research Article