A Radical Block to Byzantine Attacks in Mobile Ad Hoc Networks

Mobile Ad Hoc networks is a wide area of mobile computing and has many narrowed domains such as sensor networks, VANETs, pervasive and ubiquitous computing. These set of varying networks are used in applications ranging from crucial to commercial and social usage. Few of the applications of MANETs a...

Full description

Saved in:
Bibliographic Details
Published inWireless personal communications Vol. 87; no. 2; pp. 485 - 497
Main Authors Sivakami, R., Kadhar Nawaz, G. M.
Format Journal Article
LanguageEnglish
Published New York Springer US 01.03.2016
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Mobile Ad Hoc networks is a wide area of mobile computing and has many narrowed domains such as sensor networks, VANETs, pervasive and ubiquitous computing. These set of varying networks are used in applications ranging from crucial to commercial and social usage. Few of the applications of MANETs are in medical field, military field, disaster recovery, wild life study, predicting natural calamities, and health care, transportation systems and most of the applications are security sensitive applications. In spite of tremendous research carried out in the security domain of networks, still it exists as an ever green field for new findings. MANETS are vulnerable to attackers and Byzantine attacks are the most harmful and hazardous one among the active attacks. This work presents a triple layered protection and detection mechanism and a complete blockage to this kind of insider attacks. The affected system can be recovered quickly even if the attackers partition the network into many components. Prediction is done well in advance before the attackers succeed in their intention and remedial actions are taken to retain the systems performance and reliability. The node’s behavior from the point of entrance into system is measured at each layer and aggregate performance in the form of weighted Laplacian matrix or Kirchhoff matrix is transferred between the layers as a cross layer feedback. The reliable detection and recovery scheme based on cryptosystems and message dispersion also use this feedback in blocking the Byzantine attacks. The implemented system gives highly accurate analysis of feedback of the system behavior.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:0929-6212
1572-834X
DOI:10.1007/s11277-015-3079-6