Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET

In MANETs, secured communication is considered as a key application. There have been many attempts reported in literature for enhancing security in MANETs. The way of preventing several attacks have been employed so far among which adverting collaborative attacks has become the serious challenge. Th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Cluster computing 2019-09, Vol.22 (Suppl 5), p.10849-10860
Hauptverfasser: Satheeshkumar, S., Sengottaiyan, N.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 10860
container_issue Suppl 5
container_start_page 10849
container_title Cluster computing
container_volume 22
creator Satheeshkumar, S.
Sengottaiyan, N.
description In MANETs, secured communication is considered as a key application. There have been many attempts reported in literature for enhancing security in MANETs. The way of preventing several attacks have been employed so far among which adverting collaborative attacks has become the serious challenge. The nodes which launch collaborative attacks have been detected and eliminated using Collaborative Bait Detection Scheme (CBDS). However, CBDS has failed to enhance the security against the jellyfish attacks which subsequently affect the routing protocol due to poor packet transmission caused by malicious nodes. The present work describes the improved approach for secured transmission by introducing ant colony optimization based clustered based routing protocol (ACO-CBRP). In this method, the clustering of nodes is done using proposed ACO based approach in which the node’s trust value determines routing performance. The nodes having the appropriate trust values enable the calculation of the trust tables of the MANET for detecting the jellyfish attacks. During the process of data transmission, enhanced security can be assured by means of secured key management. The performance evaluation of the present approach is done based on different metrics such as lifetime, overhead and packet delivery ratio using NS-2 simulator platform. The obtained result implies the better performance of the proposed ACO-CBRP approach in mitigating jellyfish attacks.
doi_str_mv 10.1007/s10586-017-1202-z
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918246892</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2918246892</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-1daf5d65f6316da7c79c45df2c2afc32cd30fc76d3d70a52a8543ef191ab3b0f3</originalsourceid><addsrcrecordid>eNp1UMlOwzAUtBBIlMIHcLPEOeCliZNjVcoisVzK2XK9lJTULn7Oof16HAWJE6e3zMxbBqFrSm4pIeIOKCnrqiBUFJQRVhxP0ISWgheinPHTnPOMiroU5-gCYEsIaQRrJijcW2e9af0Gq41qPSS8tV13cC18YpWS0l-Aexhw3fWQbMRrBdbgGPo0dPcxpKBDh12IGKzuYwaNSgqnqDzsWoA2eNx6_Dp_W64u0ZlTHdir3zhFHw_L1eKpeHl_fF7MXwrNaZUKapQrTVW6KpdGCS0aPSuNY5oppznThhOnRWW4EUSVTNX5TetoQ9War4njU3Qzzs33ffcWktyGPvq8UrKG1mxW1Q3LLDqydAwA0Tq5j-1OxYOkRA6-ytFXmX2Vg6_ymDVs1EDm-o2Nf5P_F_0Anep99g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918246892</pqid></control><display><type>article</type><title>Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET</title><source>Springer Nature - Complete Springer Journals</source><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Satheeshkumar, S. ; Sengottaiyan, N.</creator><creatorcontrib>Satheeshkumar, S. ; Sengottaiyan, N.</creatorcontrib><description>In MANETs, secured communication is considered as a key application. There have been many attempts reported in literature for enhancing security in MANETs. The way of preventing several attacks have been employed so far among which adverting collaborative attacks has become the serious challenge. The nodes which launch collaborative attacks have been detected and eliminated using Collaborative Bait Detection Scheme (CBDS). However, CBDS has failed to enhance the security against the jellyfish attacks which subsequently affect the routing protocol due to poor packet transmission caused by malicious nodes. The present work describes the improved approach for secured transmission by introducing ant colony optimization based clustered based routing protocol (ACO-CBRP). In this method, the clustering of nodes is done using proposed ACO based approach in which the node’s trust value determines routing performance. The nodes having the appropriate trust values enable the calculation of the trust tables of the MANET for detecting the jellyfish attacks. During the process of data transmission, enhanced security can be assured by means of secured key management. The performance evaluation of the present approach is done based on different metrics such as lifetime, overhead and packet delivery ratio using NS-2 simulator platform. The obtained result implies the better performance of the proposed ACO-CBRP approach in mitigating jellyfish attacks.</description><identifier>ISSN: 1386-7857</identifier><identifier>EISSN: 1573-7543</identifier><identifier>DOI: 10.1007/s10586-017-1202-z</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Ant colony optimization ; Bandwidths ; Clustering ; Collaboration ; Communication ; Computer Communication Networks ; Computer Science ; Cooperation ; Data transmission ; Mobile ad hoc networks ; Nodes ; Operating Systems ; Packet transmission ; Performance evaluation ; Prevention ; Processor Architectures ; Routing (telecommunications) ; Security</subject><ispartof>Cluster computing, 2019-09, Vol.22 (Suppl 5), p.10849-10860</ispartof><rights>Springer Science+Business Media, LLC 2017</rights><rights>Springer Science+Business Media, LLC 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-1daf5d65f6316da7c79c45df2c2afc32cd30fc76d3d70a52a8543ef191ab3b0f3</citedby><cites>FETCH-LOGICAL-c316t-1daf5d65f6316da7c79c45df2c2afc32cd30fc76d3d70a52a8543ef191ab3b0f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10586-017-1202-z$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918246892?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21368,27903,27904,33723,41467,42536,43784,51297,64361,64365,72215</link.rule.ids></links><search><creatorcontrib>Satheeshkumar, S.</creatorcontrib><creatorcontrib>Sengottaiyan, N.</creatorcontrib><title>Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET</title><title>Cluster computing</title><addtitle>Cluster Comput</addtitle><description>In MANETs, secured communication is considered as a key application. There have been many attempts reported in literature for enhancing security in MANETs. The way of preventing several attacks have been employed so far among which adverting collaborative attacks has become the serious challenge. The nodes which launch collaborative attacks have been detected and eliminated using Collaborative Bait Detection Scheme (CBDS). However, CBDS has failed to enhance the security against the jellyfish attacks which subsequently affect the routing protocol due to poor packet transmission caused by malicious nodes. The present work describes the improved approach for secured transmission by introducing ant colony optimization based clustered based routing protocol (ACO-CBRP). In this method, the clustering of nodes is done using proposed ACO based approach in which the node’s trust value determines routing performance. The nodes having the appropriate trust values enable the calculation of the trust tables of the MANET for detecting the jellyfish attacks. During the process of data transmission, enhanced security can be assured by means of secured key management. The performance evaluation of the present approach is done based on different metrics such as lifetime, overhead and packet delivery ratio using NS-2 simulator platform. The obtained result implies the better performance of the proposed ACO-CBRP approach in mitigating jellyfish attacks.</description><subject>Ant colony optimization</subject><subject>Bandwidths</subject><subject>Clustering</subject><subject>Collaboration</subject><subject>Communication</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cooperation</subject><subject>Data transmission</subject><subject>Mobile ad hoc networks</subject><subject>Nodes</subject><subject>Operating Systems</subject><subject>Packet transmission</subject><subject>Performance evaluation</subject><subject>Prevention</subject><subject>Processor Architectures</subject><subject>Routing (telecommunications)</subject><subject>Security</subject><issn>1386-7857</issn><issn>1573-7543</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1UMlOwzAUtBBIlMIHcLPEOeCliZNjVcoisVzK2XK9lJTULn7Oof16HAWJE6e3zMxbBqFrSm4pIeIOKCnrqiBUFJQRVhxP0ISWgheinPHTnPOMiroU5-gCYEsIaQRrJijcW2e9af0Gq41qPSS8tV13cC18YpWS0l-Aexhw3fWQbMRrBdbgGPo0dPcxpKBDh12IGKzuYwaNSgqnqDzsWoA2eNx6_Dp_W64u0ZlTHdir3zhFHw_L1eKpeHl_fF7MXwrNaZUKapQrTVW6KpdGCS0aPSuNY5oppznThhOnRWW4EUSVTNX5TetoQ9War4njU3Qzzs33ffcWktyGPvq8UrKG1mxW1Q3LLDqydAwA0Tq5j-1OxYOkRA6-ytFXmX2Vg6_ymDVs1EDm-o2Nf5P_F_0Anep99g</recordid><startdate>20190901</startdate><enddate>20190901</enddate><creator>Satheeshkumar, S.</creator><creator>Sengottaiyan, N.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20190901</creationdate><title>Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET</title><author>Satheeshkumar, S. ; Sengottaiyan, N.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-1daf5d65f6316da7c79c45df2c2afc32cd30fc76d3d70a52a8543ef191ab3b0f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Ant colony optimization</topic><topic>Bandwidths</topic><topic>Clustering</topic><topic>Collaboration</topic><topic>Communication</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cooperation</topic><topic>Data transmission</topic><topic>Mobile ad hoc networks</topic><topic>Nodes</topic><topic>Operating Systems</topic><topic>Packet transmission</topic><topic>Performance evaluation</topic><topic>Prevention</topic><topic>Processor Architectures</topic><topic>Routing (telecommunications)</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Satheeshkumar, S.</creatorcontrib><creatorcontrib>Sengottaiyan, N.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Cluster computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Satheeshkumar, S.</au><au>Sengottaiyan, N.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET</atitle><jtitle>Cluster computing</jtitle><stitle>Cluster Comput</stitle><date>2019-09-01</date><risdate>2019</risdate><volume>22</volume><issue>Suppl 5</issue><spage>10849</spage><epage>10860</epage><pages>10849-10860</pages><issn>1386-7857</issn><eissn>1573-7543</eissn><abstract>In MANETs, secured communication is considered as a key application. There have been many attempts reported in literature for enhancing security in MANETs. The way of preventing several attacks have been employed so far among which adverting collaborative attacks has become the serious challenge. The nodes which launch collaborative attacks have been detected and eliminated using Collaborative Bait Detection Scheme (CBDS). However, CBDS has failed to enhance the security against the jellyfish attacks which subsequently affect the routing protocol due to poor packet transmission caused by malicious nodes. The present work describes the improved approach for secured transmission by introducing ant colony optimization based clustered based routing protocol (ACO-CBRP). In this method, the clustering of nodes is done using proposed ACO based approach in which the node’s trust value determines routing performance. The nodes having the appropriate trust values enable the calculation of the trust tables of the MANET for detecting the jellyfish attacks. During the process of data transmission, enhanced security can be assured by means of secured key management. The performance evaluation of the present approach is done based on different metrics such as lifetime, overhead and packet delivery ratio using NS-2 simulator platform. The obtained result implies the better performance of the proposed ACO-CBRP approach in mitigating jellyfish attacks.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10586-017-1202-z</doi><tpages>12</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1386-7857
ispartof Cluster computing, 2019-09, Vol.22 (Suppl 5), p.10849-10860
issn 1386-7857
1573-7543
language eng
recordid cdi_proquest_journals_2918246892
source Springer Nature - Complete Springer Journals; ProQuest Central UK/Ireland; ProQuest Central
subjects Ant colony optimization
Bandwidths
Clustering
Collaboration
Communication
Computer Communication Networks
Computer Science
Cooperation
Data transmission
Mobile ad hoc networks
Nodes
Operating Systems
Packet transmission
Performance evaluation
Prevention
Processor Architectures
Routing (telecommunications)
Security
title Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T14%3A54%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Defending%20against%20jellyfish%20attacks%20using%20cluster%20based%20routing%20protocol%20for%20secured%20data%20transmission%20in%20MANET&rft.jtitle=Cluster%20computing&rft.au=Satheeshkumar,%20S.&rft.date=2019-09-01&rft.volume=22&rft.issue=Suppl%205&rft.spage=10849&rft.epage=10860&rft.pages=10849-10860&rft.issn=1386-7857&rft.eissn=1573-7543&rft_id=info:doi/10.1007/s10586-017-1202-z&rft_dat=%3Cproquest_cross%3E2918246892%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918246892&rft_id=info:pmid/&rfr_iscdi=true