In today’s world of wireless networks the mobile ad-hoc networks are widely preferred as a communication medium as these are infrastructure less networks. The application layer of these networks is targeted by attackers because it is responsible for actual data exchange with end users. As human dependency on wireless networks is increasing the DDoS attacks i.e. distributed denial of service attack which becomes a nightmare for the researchers. This attack is one of the most devastating attacks that can be executed on web-servers and congest the network keys like socket connections, CPU cycles, and memory database. In this current mobile computing world the necessity of DDOS attack management is significantly increased because this attack can degrade the entire web experience. Further, this DDOS attack is commenced along with the legitimate requests so it is also important to differentiate DDoS attack from other similar Events. This review endeavors to explore with more emphasis on application layer DDoS attack and its management stages like prevention, detection, mitigation and Differentiation along with comparative statement of prominent techniques discovered in each stage. This methodological survey report shall lead the way to researchers and network designers to suit the specific management scheme to provide the complete protection of wireless networks from DDoS attack.
相似文献Wireless body area network (WBAN) is utilized in various healthcare applications due to its ability to provide suitable medical services by exchanging the biological data between the patient and doctor through a network of implantable or wearable medical sensors connected in the patients’ body. The collected data are communicated to the medical personals through open wireless channels. Nevertheless, due to the open wireless nature of communication channels, WBAN is susceptible to security attacks by malicious users. For that reason, secure anonymous authentication and confidentiality preservation schemes are essential in WBAN. Authentication and confidentiality play a significant role while transfers, medical images securely across the network. Since medical images contain highly sensitive information, those images should be transferred securely from the patients to the doctor and vice versa. The proposed anonymous authentication technique helps to ensure the legitimacy of the patient and doctors without disclosing their privacy. Even though various cryptographic encryption techniques such as AES and DES are available to provide confidentiality, the key size and the key sharing are the main problems to provide a worthy level of security. Hence, an efficient affine cipher-based encryption technique is proposed in this paper to offer a high level of confidentiality with smaller key size compared to existing encryption techniques. The security strength of the proposed work against various harmful security attacks is proven in security analysis section to ensure that it provides better security. The storage cost, communication cost and computational cost of the proposed scheme are demonstrated in the performance analysis section elaborately. In connection to this, the computational complexity of the proposed scheme is reduced around 29% compared to the existing scheme.
相似文献There are many smart applications evolved in the area of the wireless sensor networks. The applications of WSNs are exponentially increasing every year which creates a lot of security challenges that need to be addressed to safeguard the devices in WSN. Due to the dynamic characteristics of these resource constrained devices in WSN, there must be high level security requirements to be considered to create a high secure environments. This paper presents an efficient multi attribute based routing algorithm to provide secure routing of information for WSNs. The work proposed in this paper can decrease the energy and enhances the performance of the network than the currently available routing algorithm such as multi-attribute pheromone ant secure routing algorithm based on reputation value and ant-colony optimization algorithm. The proposed work secures the network environment with the improved detection techniques based on nodes’ higher coincidence rates to find the malicious behavior using trust calculation algorithm. This algorithm uses some QoS parameters such as reliability rate, elapsed time to detect impersonation attacks, and stability rate for trust related attacks, to perform an efficient trust calculation of the nodes in communication. The outcome of the simulation show that the proposed method enhances the performance of the network with the improved detection rate and secure routing service.
相似文献Many errors in data communication cause security attacks in Internet of Things (IoT). Routing errors at network layer are prominent errors in IoT which degrade the quality of data communication. Many attacks like sinkhole attack, blackhole attack, selective forwarding attack and wormhole attack enter the network through the network layer of the IoT. This paper has an emphasis on the detection of a wormhole attack because it is one of the most uncompromising attacks at the network layer of IoT protocol stack. The wormhole attack is the most disruptive attack out of all the other attacks mentioned above. The wormhole attack inserts information on incorrect routes in the network; it also alters the network information by causing a failure of location-dependent protocols thus defeating the purpose of routing algorithms. This paper covers the design and implementation of an innovative intrusion detection system for the IoT that detects a wormhole attack and the attacker nodes. The presence of a wormhole attack is identified using location information of any node and its neighbor with the help of Received Signal Strength Indicator (RSSI) values and the hop-count. The proposed system is energy efficient hence it is beneficial for a resource-constrained environment of IoT. It also provides precise true-positive (TPR) and false-positive detection rate (FPR).
相似文献Secured self organizing network is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. In delay tolerant network packets storage exists when there is any link breakage between the nodes in the network so delay is tolerable in this type of network during the data transmission. But this delay is not tolerable in wireless network for voice packet transmission. This evokes the use of wireless networks. In a network, different wireless network topologies are interoperating with each other so the communication across the network is called overlay network. This network is vulnerable to attacks due to mobile behaviour of nodes and frequent changes in topologies of the network. The attacks are wormhole attack and blackhole attack is analysed in this paper. They are critical threats to normal operation in wireless networks which results in the degradation of the network performance. The proposed recovery algorithm for wormhole and the isolation of blackhole will increase the performance of the network. The performance metrics such as throughput, packet delivery ratio, end–end delay and routing overhead of the network are evaluated.
相似文献Mobile ad hoc network is open medium, infrastructure-less and easy to install. Despite these features, mobile ad hoc network is vulnerable to various security attacks. Black hole and gray hole security attacks outrank among all security attacks. This paper proposes a distributed delegation-based scheme, namely, a secure path selection scheme. The proposed scheme identifies and allows only trusted nodes to become part of active path. The simulation results revealed that proposed scheme improved the packet delivery ratio, packet loss rate, throughput by 8% and routing overhead by 5% as compared to other system.
相似文献Video surveillance system plays a pivotal role in automatic detection of abandoned luggage/bag in public places which causes threats to the public. As, the terrorist attacks are increasing world-wide, the detection and prevention of such attack is necessary to safeguard the people in public places. In this, a novel framework for the detection and classification of static object is proposed. In the proposed work first the static objects are identified and then it is classified to check the detected object is bag or anything else. In this study, the performance of machine learning techniques like Support Vector Machine (SVM), Artificial Neural Network (ANN), K-Nearest Neighbour, and Random Forest methods are analyzed. The performance is tested in standard (PETS 2006, PETS 2007 and AVSS i-LIDS) and custom datasets. The SVM and ANN produce best results in terms of classification and accuracy. Applications of various machine learning algorithms could clearly assist for identification and prevention of terrorist attacks in public places.
相似文献Wireless sensor networks (WSN) were cataloged as one of the most important emerging technologies of the last century and are considered the basis of the Internet of Things paradigm. However, an undeniable disadvantage of WSN is that the resources available for these types of networks, such as processing capacity, memory, and battery, are usually in short supply. This limitation in resources implements security mechanisms a difficult task. This work reviews 93 recent proposals in which different solutions were formulated for the different attacks in WSN in the network layer; in total, 139 references were considered. According to the literature, these attacks are mainly Sybil, wormhole, sinkhole, and selective forwarding. The main goal of this contribution is to present the evaluation metrics used in the state of the art to mitigate the Sybil, wormhole, sinkhole, and selective forwarding attacks and show the network topologies used in each of these proposals.
相似文献Vehicular ad hoc networks (VANETs) have the ability to make changes in travelling and driving mode of people and so on, in which vehicle can broadcast and forward the message related to emergency or present road condition. The safety and efficiency of modern transportation system is highly improved using VANETs. However, the vehicular communication performance is weakened with the sudden emergence of distributed denial of service (DDoS) attacks. Among other attacks, DDoS attack is the fastest attack degrading the VANETs performance due to its node mobility nature. Also, the attackers (cyber terrorists, politicians, etc.) have now considered the DDoS attack as a network service degradation weapon. In current trend, there is a quick need for mitigation and prevention of DDoS attacks in the exploration field. To resolve the conflict of privacy preservation, we propose a fast and secure HCPDS based framework for DDoS attack detection and prevention in VANETs. The Road Side Units (RSUs) have used HCPDS algorithm to evaluate the fitness values of all vehicles. This evaluation process is done for effective detection of spoofing and misbehaving nodes by comparing the obtained fitness value with the statistical information (packet factors, RSU zone, and vehicle dynamics) gathered from the vehicles. The credentials of all worst nodes are cancelled to avoid further communication with other vehicles. In HCPDS algorithm, the PSO updation strategy is added to Dragon fly algorithm to improve the search space. In addition, Chaos theory is applied to tune the parameters of proposed HCPDS algorithm. From the experimental results, it proved that the HCPDS based proposed approach can efficiently meet the requirements of security and privacy in VANETs.
相似文献WSN serves as a medium for linking the physical and information network of IoT. Energy and trust are the two major factors that facilitate reliable communication in the network. During multicast routing, the BS engages in forwarding the data securely to the multiple destinations through the intermediate nodes, which is the major challenge in IoT. The paper addresses the challenges through proposing an energy-aware multicast routing protocol based on the optimization, CrowWhale-ETR, which is the integration of CSA and WOA based on the objective function designed with the energy and trust factors of the nodes. Initially, the trust and energy of the nodes are evaluated for establishing the routes that is chosen optimally using CWOA. This optimally chosen path is used for the data transmission, in which energy and trusts of the individual nodes are updated at the end of the individual transmission, in such a way the secure nodes can be selected, and which improves the secure communication in the network. The simulation is analyzed using 50 and 100 nodes in terms of the performance measures. The proposed method acquired the minimal delay of 0.2729 and 0.3491, maximal detection rate of 0.6726, maximal energy of 66.4275 and 71.0567, and maximal throughput of 0.4625 and 0.8649 in the presence and absence of attacks with 50 nodes for analysis.
相似文献Recent developments in dynamic mobile ad-hoc network enhance the network speed and reliability. The nodes in the dynamic ad-hoc network are moving in nature. Due to the increased subscribers in this network, the network traffic has increased to manifold which in turn creating the challenge of maintaining the energy level. In path optimization process in mobile ad-hoc network consumes more energy and the draining of the energy is dependent on network reliability and connectivity. Further, the network also suffers by harmful attacks such as denial of service attack, black hole attack and warm hole attack. The primary focus of this paper is to prevent these attacks with the help of dynamic mobile ad-hoc network on demand protocol and hybrid meta-heuristics methodologies, and also to reduce the energy drain rate. This is achieved by estimating the velocity and fitness value of the nodes. Finally, the empirical simulation results of hybrid particle swarm optimization with bat algorithm (PSO–BAT) shows that the energy drain rate level is reduced 90% as 1 mJ/s than ad-hoc on demand vector. The end-to-end delay minimized to 50% than existing Ad hoc on-demand distance vector routing. The performance metrics routing overhead and execution time has been reduced and throughput is gradually increased in PSO–BAT optimization in dynamic mobile ad hoc network scenario.
相似文献The wireless capabilities of modern Implantable Medical Devices (IMDs) make them vulnerable to security attacks. One prominent attack, which has disastrous consequences for the patient’s wellbeing, is the battery Denial-of-Service attack whereby the IMD is occupied with continuous authentication requests from an adversary with the aim of depleting its battery. Zero-Power Defense (ZPD), based on energy harvesting, is known to be an excellent protection against these attacks. This paper raises essential design considerations for employing ZPD techniques in commercial IMDs, offers a critical review of ZPD techniques found in literature and, subsequently, gives crucial recommendations for developing comprehensive ZPD solutions.
相似文献The Internet of Things is an emerging area which deals with transfer of the data through the wired or wireless network. The prime thing that needs to be addressed in this is the security of the data that must be transferred within the optimized time limit. In this paper, throughput and time delay are need to be considered for the optimized data transfer and while concentrating on this, there is a possibility of allowing the data to be vulnerable to attacks. Security algorithms currently available may be adequate for the wired system and not as the same for wireless scenario. PRESENT cipher is a one of the popular cryptosystem used in wireless which falls under the light weight cryptography category. Gift cipher is an enhanced version of PRESENT cipher. Which aims that maximizing the throughput. In this, iteration structure used for encryption. This can still be improved and optimized in terms of increased data rate and reduced time delay. In this paper, implements the optimization technique of the existing GIFT cipher and throughput is considered as the performance metrics. Pipeline and sub-stage pipeline techniques are used for enhancing the architecture.
相似文献Mobile ad hoc network is open medium and infrastructure-less network. Mobile ad hoc network is susceptible to various security attacks such as, black hole attack, gray hole attack, bad mouthing attack, sybil attack and worm hole attack due to open medium, infrastructure-less features and lack of in-built security. In black hole attack and gray hole attack, attacker falsely sends route reply and dropped data packets received from source node. Due to these attacks, performance of mobile ad hoc network decreases. This paper proposes a time stamp-based algorithm which is an enhanced version of existing IDSNAODV algorithm. Proposed algorithm modifies existing palling process to validate identity of observer nodes using a time stamp-based approach. Based on defined set of rules and recorded activities report, source node decides the nature of target node. The performance of proposed algorithm is evaluated using the network simulator. The proposed algorithm shows improved performance for packet delivery ratio, throughput and routing overhead as compared to existing algorithm.
相似文献