Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks
Owing to the growth in several applications, Wireless Mesh Networks (WMN) is emerging as a vital technology for future wireless networks. Wormhole attack is one of the major security threats, which can disturb majority of routing communications, even when placed strategically. Therefore, a technique...
Gespeichert in:
Veröffentlicht in: | Wireless networks 2017-08, Vol.23 (6), p.1709-1718 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1718 |
---|---|
container_issue | 6 |
container_start_page | 1709 |
container_title | Wireless networks |
container_volume | 23 |
creator | Akilarasu, G. Shalinie, S. Mercy |
description | Owing to the growth in several applications, Wireless Mesh Networks (WMN) is emerging as a vital technology for future wireless networks. Wormhole attack is one of the major security threats, which can disturb majority of routing communications, even when placed strategically. Therefore, a technique that can find wormhole-free routes in the network is required. In order to achieve this, in this paper, we propose a Monitoring Technique for Wormhole-Free Routing and DoS Attack Defense in WMNs. Initially, finite state model is applied where the node keeps the information about its sender and neighborhood receiver. Then, wormhole-aware secure routing is implemented to find wormhole free routes in the network. Finally, the priority mechanism is applied where the data packets are transmitted based on their priority. Based on the finite state model and priority mechanism, the malicious or wormhole nodes in the network are removed. |
doi_str_mv | 10.1007/s11276-016-1240-0 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1916951679</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1916951679</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-af57564e6b24b20daebbac08d98a149b0f6788573ef592e3bcc9e0ed8234eb403</originalsourceid><addsrcrecordid>eNp1kMtOwzAQRS0EEqXwAewssTbMOIljL6uWAlIBiYe6tJxk0qaPGOxUiL8nVVmwYTV3ce8Z6TB2iXCNAPlNRJS5EoBKoExBwBEbYJZLodGo4z6DlAIg0afsLMYVAOjEmAGbzn3YLv2GxDQQ8Re_65p2wV1b8Yl_5aOuc-WaT6imNhJvWj5vAm0oRv5IccmfqPvyYR3P2UntNpEufu-QvU9v38b3YvZ89zAezUSZoOqEq7M8UympQqaFhMpRUbgSdGW0w9QUUKtc6yxPqM6MpKQoS0NAlZZJSkUKyZBdHbgfwX_uKHZ25Xeh7V9aNKhMhio3fQsPrTL4GAPV9iM0Wxe-LYLd67IHXbbXZfe67J4sD5vYd9sFhT_kf0c_BpJsJQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1916951679</pqid></control><display><type>article</type><title>Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks</title><source>SpringerNature Complete Journals</source><creator>Akilarasu, G. ; Shalinie, S. Mercy</creator><creatorcontrib>Akilarasu, G. ; Shalinie, S. Mercy</creatorcontrib><description>Owing to the growth in several applications, Wireless Mesh Networks (WMN) is emerging as a vital technology for future wireless networks. Wormhole attack is one of the major security threats, which can disturb majority of routing communications, even when placed strategically. Therefore, a technique that can find wormhole-free routes in the network is required. In order to achieve this, in this paper, we propose a Monitoring Technique for Wormhole-Free Routing and DoS Attack Defense in WMNs. Initially, finite state model is applied where the node keeps the information about its sender and neighborhood receiver. Then, wormhole-aware secure routing is implemented to find wormhole free routes in the network. Finally, the priority mechanism is applied where the data packets are transmitted based on their priority. Based on the finite state model and priority mechanism, the malicious or wormhole nodes in the network are removed.</description><identifier>ISSN: 1022-0038</identifier><identifier>EISSN: 1572-8196</identifier><identifier>DOI: 10.1007/s11276-016-1240-0</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Communications Engineering ; Computer Communication Networks ; Computer networks ; Cybersecurity ; Denial of service attacks ; Electrical Engineering ; Engineering ; Finite element method ; IT in Business ; Networks ; Packet transmission ; Routing (telecommunications) ; Wireless networks ; Wormhole routeing</subject><ispartof>Wireless networks, 2017-08, Vol.23 (6), p.1709-1718</ispartof><rights>Springer Science+Business Media New York 2016</rights><rights>Wireless Networks is a copyright of Springer, 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-af57564e6b24b20daebbac08d98a149b0f6788573ef592e3bcc9e0ed8234eb403</citedby><cites>FETCH-LOGICAL-c316t-af57564e6b24b20daebbac08d98a149b0f6788573ef592e3bcc9e0ed8234eb403</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11276-016-1240-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11276-016-1240-0$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Akilarasu, G.</creatorcontrib><creatorcontrib>Shalinie, S. Mercy</creatorcontrib><title>Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks</title><title>Wireless networks</title><addtitle>Wireless Netw</addtitle><description>Owing to the growth in several applications, Wireless Mesh Networks (WMN) is emerging as a vital technology for future wireless networks. Wormhole attack is one of the major security threats, which can disturb majority of routing communications, even when placed strategically. Therefore, a technique that can find wormhole-free routes in the network is required. In order to achieve this, in this paper, we propose a Monitoring Technique for Wormhole-Free Routing and DoS Attack Defense in WMNs. Initially, finite state model is applied where the node keeps the information about its sender and neighborhood receiver. Then, wormhole-aware secure routing is implemented to find wormhole free routes in the network. Finally, the priority mechanism is applied where the data packets are transmitted based on their priority. Based on the finite state model and priority mechanism, the malicious or wormhole nodes in the network are removed.</description><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer networks</subject><subject>Cybersecurity</subject><subject>Denial of service attacks</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>Finite element method</subject><subject>IT in Business</subject><subject>Networks</subject><subject>Packet transmission</subject><subject>Routing (telecommunications)</subject><subject>Wireless networks</subject><subject>Wormhole routeing</subject><issn>1022-0038</issn><issn>1572-8196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp1kMtOwzAQRS0EEqXwAewssTbMOIljL6uWAlIBiYe6tJxk0qaPGOxUiL8nVVmwYTV3ce8Z6TB2iXCNAPlNRJS5EoBKoExBwBEbYJZLodGo4z6DlAIg0afsLMYVAOjEmAGbzn3YLv2GxDQQ8Re_65p2wV1b8Yl_5aOuc-WaT6imNhJvWj5vAm0oRv5IccmfqPvyYR3P2UntNpEufu-QvU9v38b3YvZ89zAezUSZoOqEq7M8UympQqaFhMpRUbgSdGW0w9QUUKtc6yxPqM6MpKQoS0NAlZZJSkUKyZBdHbgfwX_uKHZ25Xeh7V9aNKhMhio3fQsPrTL4GAPV9iM0Wxe-LYLd67IHXbbXZfe67J4sD5vYd9sFhT_kf0c_BpJsJQ</recordid><startdate>20170801</startdate><enddate>20170801</enddate><creator>Akilarasu, G.</creator><creator>Shalinie, S. Mercy</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20170801</creationdate><title>Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks</title><author>Akilarasu, G. ; Shalinie, S. Mercy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-af57564e6b24b20daebbac08d98a149b0f6788573ef592e3bcc9e0ed8234eb403</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer networks</topic><topic>Cybersecurity</topic><topic>Denial of service attacks</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>Finite element method</topic><topic>IT in Business</topic><topic>Networks</topic><topic>Packet transmission</topic><topic>Routing (telecommunications)</topic><topic>Wireless networks</topic><topic>Wormhole routeing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Akilarasu, G.</creatorcontrib><creatorcontrib>Shalinie, S. Mercy</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Akilarasu, G.</au><au>Shalinie, S. Mercy</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks</atitle><jtitle>Wireless networks</jtitle><stitle>Wireless Netw</stitle><date>2017-08-01</date><risdate>2017</risdate><volume>23</volume><issue>6</issue><spage>1709</spage><epage>1718</epage><pages>1709-1718</pages><issn>1022-0038</issn><eissn>1572-8196</eissn><abstract>Owing to the growth in several applications, Wireless Mesh Networks (WMN) is emerging as a vital technology for future wireless networks. Wormhole attack is one of the major security threats, which can disturb majority of routing communications, even when placed strategically. Therefore, a technique that can find wormhole-free routes in the network is required. In order to achieve this, in this paper, we propose a Monitoring Technique for Wormhole-Free Routing and DoS Attack Defense in WMNs. Initially, finite state model is applied where the node keeps the information about its sender and neighborhood receiver. Then, wormhole-aware secure routing is implemented to find wormhole free routes in the network. Finally, the priority mechanism is applied where the data packets are transmitted based on their priority. Based on the finite state model and priority mechanism, the malicious or wormhole nodes in the network are removed.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11276-016-1240-0</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1022-0038 |
ispartof | Wireless networks, 2017-08, Vol.23 (6), p.1709-1718 |
issn | 1022-0038 1572-8196 |
language | eng |
recordid | cdi_proquest_journals_1916951679 |
source | SpringerNature Complete Journals |
subjects | Communications Engineering Computer Communication Networks Computer networks Cybersecurity Denial of service attacks Electrical Engineering Engineering Finite element method IT in Business Networks Packet transmission Routing (telecommunications) Wireless networks Wormhole routeing |
title | Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T09%3A22%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Wormhole-Free%20Routing%20and%20DoS%20Attack%20Defense%20in%20Wireless%20Mesh%20Networks&rft.jtitle=Wireless%20networks&rft.au=Akilarasu,%20G.&rft.date=2017-08-01&rft.volume=23&rft.issue=6&rft.spage=1709&rft.epage=1718&rft.pages=1709-1718&rft.issn=1022-0038&rft.eissn=1572-8196&rft_id=info:doi/10.1007/s11276-016-1240-0&rft_dat=%3Cproquest_cross%3E1916951679%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1916951679&rft_id=info:pmid/&rfr_iscdi=true |