Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET
In MANETs, secured communication is considered as a key application. There have been many attempts reported in literature for enhancing security in MANETs. The way of preventing several attacks have been employed so far among which adverting collaborative attacks has become the serious challenge. Th...
Gespeichert in:
Veröffentlicht in: | Cluster computing 2019-09, Vol.22 (Suppl 5), p.10849-10860 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 10860 |
---|---|
container_issue | Suppl 5 |
container_start_page | 10849 |
container_title | Cluster computing |
container_volume | 22 |
creator | Satheeshkumar, S. Sengottaiyan, N. |
description | In MANETs, secured communication is considered as a key application. There have been many attempts reported in literature for enhancing security in MANETs. The way of preventing several attacks have been employed so far among which adverting collaborative attacks has become the serious challenge. The nodes which launch collaborative attacks have been detected and eliminated using Collaborative Bait Detection Scheme (CBDS). However, CBDS has failed to enhance the security against the jellyfish attacks which subsequently affect the routing protocol due to poor packet transmission caused by malicious nodes. The present work describes the improved approach for secured transmission by introducing ant colony optimization based clustered based routing protocol (ACO-CBRP). In this method, the clustering of nodes is done using proposed ACO based approach in which the node’s trust value determines routing performance. The nodes having the appropriate trust values enable the calculation of the trust tables of the MANET for detecting the jellyfish attacks. During the process of data transmission, enhanced security can be assured by means of secured key management. The performance evaluation of the present approach is done based on different metrics such as lifetime, overhead and packet delivery ratio using NS-2 simulator platform. The obtained result implies the better performance of the proposed ACO-CBRP approach in mitigating jellyfish attacks. |
doi_str_mv | 10.1007/s10586-017-1202-z |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918246892</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2918246892</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-1daf5d65f6316da7c79c45df2c2afc32cd30fc76d3d70a52a8543ef191ab3b0f3</originalsourceid><addsrcrecordid>eNp1UMlOwzAUtBBIlMIHcLPEOeCliZNjVcoisVzK2XK9lJTULn7Oof16HAWJE6e3zMxbBqFrSm4pIeIOKCnrqiBUFJQRVhxP0ISWgheinPHTnPOMiroU5-gCYEsIaQRrJijcW2e9af0Gq41qPSS8tV13cC18YpWS0l-Aexhw3fWQbMRrBdbgGPo0dPcxpKBDh12IGKzuYwaNSgqnqDzsWoA2eNx6_Dp_W64u0ZlTHdir3zhFHw_L1eKpeHl_fF7MXwrNaZUKapQrTVW6KpdGCS0aPSuNY5oppznThhOnRWW4EUSVTNX5TetoQ9War4njU3Qzzs33ffcWktyGPvq8UrKG1mxW1Q3LLDqydAwA0Tq5j-1OxYOkRA6-ytFXmX2Vg6_ymDVs1EDm-o2Nf5P_F_0Anep99g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918246892</pqid></control><display><type>article</type><title>Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET</title><source>Springer Nature - Complete Springer Journals</source><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Satheeshkumar, S. ; Sengottaiyan, N.</creator><creatorcontrib>Satheeshkumar, S. ; Sengottaiyan, N.</creatorcontrib><description>In MANETs, secured communication is considered as a key application. There have been many attempts reported in literature for enhancing security in MANETs. The way of preventing several attacks have been employed so far among which adverting collaborative attacks has become the serious challenge. The nodes which launch collaborative attacks have been detected and eliminated using Collaborative Bait Detection Scheme (CBDS). However, CBDS has failed to enhance the security against the jellyfish attacks which subsequently affect the routing protocol due to poor packet transmission caused by malicious nodes. The present work describes the improved approach for secured transmission by introducing ant colony optimization based clustered based routing protocol (ACO-CBRP). In this method, the clustering of nodes is done using proposed ACO based approach in which the node’s trust value determines routing performance. The nodes having the appropriate trust values enable the calculation of the trust tables of the MANET for detecting the jellyfish attacks. During the process of data transmission, enhanced security can be assured by means of secured key management. The performance evaluation of the present approach is done based on different metrics such as lifetime, overhead and packet delivery ratio using NS-2 simulator platform. The obtained result implies the better performance of the proposed ACO-CBRP approach in mitigating jellyfish attacks.</description><identifier>ISSN: 1386-7857</identifier><identifier>EISSN: 1573-7543</identifier><identifier>DOI: 10.1007/s10586-017-1202-z</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Ant colony optimization ; Bandwidths ; Clustering ; Collaboration ; Communication ; Computer Communication Networks ; Computer Science ; Cooperation ; Data transmission ; Mobile ad hoc networks ; Nodes ; Operating Systems ; Packet transmission ; Performance evaluation ; Prevention ; Processor Architectures ; Routing (telecommunications) ; Security</subject><ispartof>Cluster computing, 2019-09, Vol.22 (Suppl 5), p.10849-10860</ispartof><rights>Springer Science+Business Media, LLC 2017</rights><rights>Springer Science+Business Media, LLC 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-1daf5d65f6316da7c79c45df2c2afc32cd30fc76d3d70a52a8543ef191ab3b0f3</citedby><cites>FETCH-LOGICAL-c316t-1daf5d65f6316da7c79c45df2c2afc32cd30fc76d3d70a52a8543ef191ab3b0f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10586-017-1202-z$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918246892?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21368,27903,27904,33723,41467,42536,43784,51297,64361,64365,72215</link.rule.ids></links><search><creatorcontrib>Satheeshkumar, S.</creatorcontrib><creatorcontrib>Sengottaiyan, N.</creatorcontrib><title>Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET</title><title>Cluster computing</title><addtitle>Cluster Comput</addtitle><description>In MANETs, secured communication is considered as a key application. There have been many attempts reported in literature for enhancing security in MANETs. The way of preventing several attacks have been employed so far among which adverting collaborative attacks has become the serious challenge. The nodes which launch collaborative attacks have been detected and eliminated using Collaborative Bait Detection Scheme (CBDS). However, CBDS has failed to enhance the security against the jellyfish attacks which subsequently affect the routing protocol due to poor packet transmission caused by malicious nodes. The present work describes the improved approach for secured transmission by introducing ant colony optimization based clustered based routing protocol (ACO-CBRP). In this method, the clustering of nodes is done using proposed ACO based approach in which the node’s trust value determines routing performance. The nodes having the appropriate trust values enable the calculation of the trust tables of the MANET for detecting the jellyfish attacks. During the process of data transmission, enhanced security can be assured by means of secured key management. The performance evaluation of the present approach is done based on different metrics such as lifetime, overhead and packet delivery ratio using NS-2 simulator platform. The obtained result implies the better performance of the proposed ACO-CBRP approach in mitigating jellyfish attacks.</description><subject>Ant colony optimization</subject><subject>Bandwidths</subject><subject>Clustering</subject><subject>Collaboration</subject><subject>Communication</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cooperation</subject><subject>Data transmission</subject><subject>Mobile ad hoc networks</subject><subject>Nodes</subject><subject>Operating Systems</subject><subject>Packet transmission</subject><subject>Performance evaluation</subject><subject>Prevention</subject><subject>Processor Architectures</subject><subject>Routing (telecommunications)</subject><subject>Security</subject><issn>1386-7857</issn><issn>1573-7543</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1UMlOwzAUtBBIlMIHcLPEOeCliZNjVcoisVzK2XK9lJTULn7Oof16HAWJE6e3zMxbBqFrSm4pIeIOKCnrqiBUFJQRVhxP0ISWgheinPHTnPOMiroU5-gCYEsIaQRrJijcW2e9af0Gq41qPSS8tV13cC18YpWS0l-Aexhw3fWQbMRrBdbgGPo0dPcxpKBDh12IGKzuYwaNSgqnqDzsWoA2eNx6_Dp_W64u0ZlTHdir3zhFHw_L1eKpeHl_fF7MXwrNaZUKapQrTVW6KpdGCS0aPSuNY5oppznThhOnRWW4EUSVTNX5TetoQ9War4njU3Qzzs33ffcWktyGPvq8UrKG1mxW1Q3LLDqydAwA0Tq5j-1OxYOkRA6-ytFXmX2Vg6_ymDVs1EDm-o2Nf5P_F_0Anep99g</recordid><startdate>20190901</startdate><enddate>20190901</enddate><creator>Satheeshkumar, S.</creator><creator>Sengottaiyan, N.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20190901</creationdate><title>Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET</title><author>Satheeshkumar, S. ; Sengottaiyan, N.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-1daf5d65f6316da7c79c45df2c2afc32cd30fc76d3d70a52a8543ef191ab3b0f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Ant colony optimization</topic><topic>Bandwidths</topic><topic>Clustering</topic><topic>Collaboration</topic><topic>Communication</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cooperation</topic><topic>Data transmission</topic><topic>Mobile ad hoc networks</topic><topic>Nodes</topic><topic>Operating Systems</topic><topic>Packet transmission</topic><topic>Performance evaluation</topic><topic>Prevention</topic><topic>Processor Architectures</topic><topic>Routing (telecommunications)</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Satheeshkumar, S.</creatorcontrib><creatorcontrib>Sengottaiyan, N.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Cluster computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Satheeshkumar, S.</au><au>Sengottaiyan, N.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET</atitle><jtitle>Cluster computing</jtitle><stitle>Cluster Comput</stitle><date>2019-09-01</date><risdate>2019</risdate><volume>22</volume><issue>Suppl 5</issue><spage>10849</spage><epage>10860</epage><pages>10849-10860</pages><issn>1386-7857</issn><eissn>1573-7543</eissn><abstract>In MANETs, secured communication is considered as a key application. There have been many attempts reported in literature for enhancing security in MANETs. The way of preventing several attacks have been employed so far among which adverting collaborative attacks has become the serious challenge. The nodes which launch collaborative attacks have been detected and eliminated using Collaborative Bait Detection Scheme (CBDS). However, CBDS has failed to enhance the security against the jellyfish attacks which subsequently affect the routing protocol due to poor packet transmission caused by malicious nodes. The present work describes the improved approach for secured transmission by introducing ant colony optimization based clustered based routing protocol (ACO-CBRP). In this method, the clustering of nodes is done using proposed ACO based approach in which the node’s trust value determines routing performance. The nodes having the appropriate trust values enable the calculation of the trust tables of the MANET for detecting the jellyfish attacks. During the process of data transmission, enhanced security can be assured by means of secured key management. The performance evaluation of the present approach is done based on different metrics such as lifetime, overhead and packet delivery ratio using NS-2 simulator platform. The obtained result implies the better performance of the proposed ACO-CBRP approach in mitigating jellyfish attacks.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10586-017-1202-z</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1386-7857 |
ispartof | Cluster computing, 2019-09, Vol.22 (Suppl 5), p.10849-10860 |
issn | 1386-7857 1573-7543 |
language | eng |
recordid | cdi_proquest_journals_2918246892 |
source | Springer Nature - Complete Springer Journals; ProQuest Central UK/Ireland; ProQuest Central |
subjects | Ant colony optimization Bandwidths Clustering Collaboration Communication Computer Communication Networks Computer Science Cooperation Data transmission Mobile ad hoc networks Nodes Operating Systems Packet transmission Performance evaluation Prevention Processor Architectures Routing (telecommunications) Security |
title | Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T14%3A54%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Defending%20against%20jellyfish%20attacks%20using%20cluster%20based%20routing%20protocol%20for%20secured%20data%20transmission%20in%20MANET&rft.jtitle=Cluster%20computing&rft.au=Satheeshkumar,%20S.&rft.date=2019-09-01&rft.volume=22&rft.issue=Suppl%205&rft.spage=10849&rft.epage=10860&rft.pages=10849-10860&rft.issn=1386-7857&rft.eissn=1573-7543&rft_id=info:doi/10.1007/s10586-017-1202-z&rft_dat=%3Cproquest_cross%3E2918246892%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918246892&rft_id=info:pmid/&rfr_iscdi=true |