Universal Analysis and Detection Framework for Location Aided Routing

In the MANETs (Mobile Ad Hoc Networks), attack detection in Location Aided Routing (LAR) has become a challenging problem due to the dynamic network topology and diverse routing attacks. This paper proposes a universal framework to analyze and detect attack traces for various potential attack targets. In this framework, the attack targets are identified by matching key events, and a reverse search algorithm based on iteration is employed to obtain attack traces and attack conditions, which are guidance for generation of detection rules. Algebra for Wireless Mesh Networks (AWN) is extended to specify the core functionality of LAR, and detection rules are validated by NS-2 platform. The results demonstrate that the approach is correct and efficient.

[1]  Nitin H. Vaidya,et al.  Location-aided routing (LAR) in mobile ad hoc networks , 1998, MobiCom '98.

[2]  Nitin H. Vaidya,et al.  Location‐Aided Routing (LAR) in mobile ad hoc networks , 2000, Wirel. Networks.

[3]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[4]  Victor C. M. Leung,et al.  A framework of secure location service for position-based ad hoc routing , 2004, PE-WASUN '04.

[5]  L. Iftode,et al.  Securing Geographical Routing in Mobile Ad-hoc Networks , 2008 .

[6]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[7]  Zoran Bojkovic,et al.  Security Issues in Wireless Sensor Networks , 2008 .

[8]  Kalpana Sharma,et al.  Wireless Sensor Networks: An Overview on its Security Threats , 2010 .

[9]  Xiong Huagang,et al.  An efficient location-aided link state routing protocol for MANETs , 2010, The 2nd International Conference on Information Science and Engineering.

[10]  Parul Tomar Framework for Location Based Power Aware Routing in , 2011 .

[11]  Bo Peng,et al.  Surveying Position Based Routing Protocols for Wireless Sensor and Ad-hoc Networks , 2012, Int. J. Commun. Networks Inf. Secur..

[12]  Satish K. Singh,et al.  A SURVEY OF ROUTING PROTOCOLS AND GEOGRAPHIC ROUTING PROTOCOL USING GPS IN MANET , 2012 .

[13]  Anastasios A. Economides,et al.  Wireless sensor network security visualization , 2012, 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems.

[14]  P. Manhas,et al.  Secure Network Coding Approach With Distributed Reprogramming Protocol For Cluster Based Ad-hoc Networks In Dynamic Key Management Of Wireless Sensor Networks , 2013 .

[15]  Ali Farrokhtala,et al.  Security in Wireless Sensor Networks: Issues and challanges , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).

[16]  Kalpana Tyagi,et al.  Secure Approach for Location Aided Routing in Mobile Ad Hoc Network , 2014 .

[17]  Fangmin Sun,et al.  A Review of Attacks and Security Protocols for Wireless Sensor Networks , 2014, J. Networks.

[18]  H. Shanthi,et al.  Performance analysis of black hole attacks in geographical routing MANET , 2014 .

[19]  Hyunsung Kim,et al.  Privacy Preservation and Protection Scheme over ALARM on Geographical Routing , 2015, 2015 8th International Conference on Security Technology (SecTech).

[20]  A. K. Jaiswal,et al.  Effective Performance of Location Aided Routing Protocol on Random Walk (RW) Mobility Model using Constant Bit Rate (CBR) , 2015 .

[21]  P. Phoummavong,et al.  Efficient Location-aided Route Discovery Mechanism for Ad-hoc networks , 2015 .

[22]  Priya Mishra,et al.  SDLAR: Self Adaptive Density-Based Location-Aware Routing in Mobile Adhoc Network , 2016 .

[23]  H. Shanthi,et al.  Secure and Efficient Distance Effect Routing Algorithm for Mobility (SE_DREAM) in MANETs , 2016 .

[24]  V. Neelanarayanan,et al.  Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC - 16') , 2016 .

[25]  Ram Shringar Raw,et al.  Distance and direction-based location aided multi-hop routing protocol for vehicular ad-hoc networks , 2016, Int. J. Commun. Networks Distributed Syst..

[26]  M. Kumar,et al.  Security issues in wireless sensor networks , 2017 .