Wireless Communications, Networking and Applications

  • Lai W
  • Huang J
  • Yang P
  • et al.
ISSN: 18761119
N/ACitations
Citations of this article
82Readers
Mendeley users who have this article in their library.

Abstract

MANETs are exploited due to their dynamic formation of wireless networks and functioning without the help of any infrastructure, thus making them subjected to security attacks. Here we deal with the stealthy attack, wherein the packets sent from the source are disrupted from reaching the destination due to the malicious behavior of any intermediate node. It is a suite of packet misrouting, power control, colluding collision, and identity delegation. The stealthy attack is detected using guard nodes which monitor all its neighboring nodes and formally send a behavior report of its observation. Since the number of neighboring nodes can be high, which could lead to more congestion in exchanging reports, we propose a novel algorithm called DSMG to optimize the selection of the guard nodes, which are empowered with local monitoring. Guard nodes are selected from the common neighbor list of communicating mobile nodes. The selection is further optimized by choosing the node that is more trustworthy. Simulation results show that the overall throughput is increased and also the packet delivery ratio of the nodes in the network is improved.

Cite

CITATION STYLE

APA

Lai, W., Huang, J., Yang, P., Kathiroli, R., & Arivudainambi, D. (2016). Wireless Communications, Networking and Applications. Lecture Notes in Electrical Engineering, 348, 127–140. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84952361866&partnerID=tZOtx3y1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free