Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks

Owing to the growth in several applications, Wireless Mesh Networks (WMN) is emerging as a vital technology for future wireless networks. Wormhole attack is one of the major security threats, which can disturb majority of routing communications, even when placed strategically. Therefore, a technique...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless networks 2017-08, Vol.23 (6), p.1709-1718
Hauptverfasser: Akilarasu, G., Shalinie, S. Mercy
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1718
container_issue 6
container_start_page 1709
container_title Wireless networks
container_volume 23
creator Akilarasu, G.
Shalinie, S. Mercy
description Owing to the growth in several applications, Wireless Mesh Networks (WMN) is emerging as a vital technology for future wireless networks. Wormhole attack is one of the major security threats, which can disturb majority of routing communications, even when placed strategically. Therefore, a technique that can find wormhole-free routes in the network is required. In order to achieve this, in this paper, we propose a Monitoring Technique for Wormhole-Free Routing and DoS Attack Defense in WMNs. Initially, finite state model is applied where the node keeps the information about its sender and neighborhood receiver. Then, wormhole-aware secure routing is implemented to find wormhole free routes in the network. Finally, the priority mechanism is applied where the data packets are transmitted based on their priority. Based on the finite state model and priority mechanism, the malicious or wormhole nodes in the network are removed.
doi_str_mv 10.1007/s11276-016-1240-0
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1916951679</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1916951679</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-af57564e6b24b20daebbac08d98a149b0f6788573ef592e3bcc9e0ed8234eb403</originalsourceid><addsrcrecordid>eNp1kMtOwzAQRS0EEqXwAewssTbMOIljL6uWAlIBiYe6tJxk0qaPGOxUiL8nVVmwYTV3ce8Z6TB2iXCNAPlNRJS5EoBKoExBwBEbYJZLodGo4z6DlAIg0afsLMYVAOjEmAGbzn3YLv2GxDQQ8Re_65p2wV1b8Yl_5aOuc-WaT6imNhJvWj5vAm0oRv5IccmfqPvyYR3P2UntNpEufu-QvU9v38b3YvZ89zAezUSZoOqEq7M8UympQqaFhMpRUbgSdGW0w9QUUKtc6yxPqM6MpKQoS0NAlZZJSkUKyZBdHbgfwX_uKHZ25Xeh7V9aNKhMhio3fQsPrTL4GAPV9iM0Wxe-LYLd67IHXbbXZfe67J4sD5vYd9sFhT_kf0c_BpJsJQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1916951679</pqid></control><display><type>article</type><title>Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks</title><source>SpringerNature Complete Journals</source><creator>Akilarasu, G. ; Shalinie, S. Mercy</creator><creatorcontrib>Akilarasu, G. ; Shalinie, S. Mercy</creatorcontrib><description>Owing to the growth in several applications, Wireless Mesh Networks (WMN) is emerging as a vital technology for future wireless networks. Wormhole attack is one of the major security threats, which can disturb majority of routing communications, even when placed strategically. Therefore, a technique that can find wormhole-free routes in the network is required. In order to achieve this, in this paper, we propose a Monitoring Technique for Wormhole-Free Routing and DoS Attack Defense in WMNs. Initially, finite state model is applied where the node keeps the information about its sender and neighborhood receiver. Then, wormhole-aware secure routing is implemented to find wormhole free routes in the network. Finally, the priority mechanism is applied where the data packets are transmitted based on their priority. Based on the finite state model and priority mechanism, the malicious or wormhole nodes in the network are removed.</description><identifier>ISSN: 1022-0038</identifier><identifier>EISSN: 1572-8196</identifier><identifier>DOI: 10.1007/s11276-016-1240-0</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Communications Engineering ; Computer Communication Networks ; Computer networks ; Cybersecurity ; Denial of service attacks ; Electrical Engineering ; Engineering ; Finite element method ; IT in Business ; Networks ; Packet transmission ; Routing (telecommunications) ; Wireless networks ; Wormhole routeing</subject><ispartof>Wireless networks, 2017-08, Vol.23 (6), p.1709-1718</ispartof><rights>Springer Science+Business Media New York 2016</rights><rights>Wireless Networks is a copyright of Springer, 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-af57564e6b24b20daebbac08d98a149b0f6788573ef592e3bcc9e0ed8234eb403</citedby><cites>FETCH-LOGICAL-c316t-af57564e6b24b20daebbac08d98a149b0f6788573ef592e3bcc9e0ed8234eb403</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11276-016-1240-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11276-016-1240-0$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Akilarasu, G.</creatorcontrib><creatorcontrib>Shalinie, S. Mercy</creatorcontrib><title>Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks</title><title>Wireless networks</title><addtitle>Wireless Netw</addtitle><description>Owing to the growth in several applications, Wireless Mesh Networks (WMN) is emerging as a vital technology for future wireless networks. Wormhole attack is one of the major security threats, which can disturb majority of routing communications, even when placed strategically. Therefore, a technique that can find wormhole-free routes in the network is required. In order to achieve this, in this paper, we propose a Monitoring Technique for Wormhole-Free Routing and DoS Attack Defense in WMNs. Initially, finite state model is applied where the node keeps the information about its sender and neighborhood receiver. Then, wormhole-aware secure routing is implemented to find wormhole free routes in the network. Finally, the priority mechanism is applied where the data packets are transmitted based on their priority. Based on the finite state model and priority mechanism, the malicious or wormhole nodes in the network are removed.</description><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer networks</subject><subject>Cybersecurity</subject><subject>Denial of service attacks</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>Finite element method</subject><subject>IT in Business</subject><subject>Networks</subject><subject>Packet transmission</subject><subject>Routing (telecommunications)</subject><subject>Wireless networks</subject><subject>Wormhole routeing</subject><issn>1022-0038</issn><issn>1572-8196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp1kMtOwzAQRS0EEqXwAewssTbMOIljL6uWAlIBiYe6tJxk0qaPGOxUiL8nVVmwYTV3ce8Z6TB2iXCNAPlNRJS5EoBKoExBwBEbYJZLodGo4z6DlAIg0afsLMYVAOjEmAGbzn3YLv2GxDQQ8Re_65p2wV1b8Yl_5aOuc-WaT6imNhJvWj5vAm0oRv5IccmfqPvyYR3P2UntNpEufu-QvU9v38b3YvZ89zAezUSZoOqEq7M8UympQqaFhMpRUbgSdGW0w9QUUKtc6yxPqM6MpKQoS0NAlZZJSkUKyZBdHbgfwX_uKHZ25Xeh7V9aNKhMhio3fQsPrTL4GAPV9iM0Wxe-LYLd67IHXbbXZfe67J4sD5vYd9sFhT_kf0c_BpJsJQ</recordid><startdate>20170801</startdate><enddate>20170801</enddate><creator>Akilarasu, G.</creator><creator>Shalinie, S. Mercy</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20170801</creationdate><title>Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks</title><author>Akilarasu, G. ; Shalinie, S. Mercy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-af57564e6b24b20daebbac08d98a149b0f6788573ef592e3bcc9e0ed8234eb403</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer networks</topic><topic>Cybersecurity</topic><topic>Denial of service attacks</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>Finite element method</topic><topic>IT in Business</topic><topic>Networks</topic><topic>Packet transmission</topic><topic>Routing (telecommunications)</topic><topic>Wireless networks</topic><topic>Wormhole routeing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Akilarasu, G.</creatorcontrib><creatorcontrib>Shalinie, S. Mercy</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Akilarasu, G.</au><au>Shalinie, S. Mercy</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks</atitle><jtitle>Wireless networks</jtitle><stitle>Wireless Netw</stitle><date>2017-08-01</date><risdate>2017</risdate><volume>23</volume><issue>6</issue><spage>1709</spage><epage>1718</epage><pages>1709-1718</pages><issn>1022-0038</issn><eissn>1572-8196</eissn><abstract>Owing to the growth in several applications, Wireless Mesh Networks (WMN) is emerging as a vital technology for future wireless networks. Wormhole attack is one of the major security threats, which can disturb majority of routing communications, even when placed strategically. Therefore, a technique that can find wormhole-free routes in the network is required. In order to achieve this, in this paper, we propose a Monitoring Technique for Wormhole-Free Routing and DoS Attack Defense in WMNs. Initially, finite state model is applied where the node keeps the information about its sender and neighborhood receiver. Then, wormhole-aware secure routing is implemented to find wormhole free routes in the network. Finally, the priority mechanism is applied where the data packets are transmitted based on their priority. Based on the finite state model and priority mechanism, the malicious or wormhole nodes in the network are removed.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11276-016-1240-0</doi><tpages>10</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1022-0038
ispartof Wireless networks, 2017-08, Vol.23 (6), p.1709-1718
issn 1022-0038
1572-8196
language eng
recordid cdi_proquest_journals_1916951679
source SpringerNature Complete Journals
subjects Communications Engineering
Computer Communication Networks
Computer networks
Cybersecurity
Denial of service attacks
Electrical Engineering
Engineering
Finite element method
IT in Business
Networks
Packet transmission
Routing (telecommunications)
Wireless networks
Wormhole routeing
title Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T09%3A22%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Wormhole-Free%20Routing%20and%20DoS%20Attack%20Defense%20in%20Wireless%20Mesh%20Networks&rft.jtitle=Wireless%20networks&rft.au=Akilarasu,%20G.&rft.date=2017-08-01&rft.volume=23&rft.issue=6&rft.spage=1709&rft.epage=1718&rft.pages=1709-1718&rft.issn=1022-0038&rft.eissn=1572-8196&rft_id=info:doi/10.1007/s11276-016-1240-0&rft_dat=%3Cproquest_cross%3E1916951679%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1916951679&rft_id=info:pmid/&rfr_iscdi=true