Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2019, Article ID 4683982, 14 pages
https://doi.org/10.1155/2019/4683982
Research Article

Detection and Prevention of Man-in-the-Middle Spoofing Attacks in MANETs Using Predictive Techniques in Artificial Neural Networks (ANN)

Department of Computer Engineering, University of Ghana, PMB 25, Legon, Accra, Ghana

Correspondence should be addressed to Robert A. Sowah; hg.ude.gu@hawosar

Received 27 June 2018; Revised 21 November 2018; Accepted 13 December 2018; Published 20 January 2019

Academic Editor: Zhiyong Xu

Copyright © 2019 Robert A. Sowah et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Goyal, V. Parmar, and R. Rishi, “MANET: vulnerabilities, challenges, attacks, application,” International Journal of Computational Engineering and Management, vol. 2011, no. 11, pp. 32–37, 2011. View at Google Scholar
  2. J. Pearlman and P. Rheingans, “Visualizing network security events using compound glyphs from a service-oriented perspective,” in Proceedings of the Workshop on Visualization for Computer Security (VizSEC 2007), J. R. Goodall, G. Conti, and K. Ma, Eds., pp. 131–146, Springer Berlin Heidelberg, Berlin, Germany, 2008.
  3. D. Hurley-Smith, J. Wetherall, and A. Adekunle, “SUPERMAN: security using pre-existing routing for mobile ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 16, no. 10, pp. 2927–2940, 2017. View at Publisher · View at Google Scholar · View at Scopus
  4. P. Hari, V. K. Shukla, and P. R. Verma, “An innovative approach for security on Mobile Ad-Hoc Network,” in Proceedings of 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), pp. 759–765, Kumarakoil, India, December 2015.
  5. J.-M. Chang, P.-C. Tsou, I. Woungang, H.-C. Chao, and C.-F. Lai, “Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach,” IEEE Systems Journal, vol. 9, no. 1, pp. 65–75, 2015. View at Publisher · View at Google Scholar · View at Scopus
  6. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Wormhole attacks in wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370–380, 2006. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Ben Othman and M. Ayaida, “Special issue on last advances on QoS and security in wireless networks,” Journal of Communications and Networks, vol. 16, no. 4, pp. 358–362, 2014. View at Publisher · View at Google Scholar · View at Scopus
  8. RSA, “Making sense of man-in-the-browser attacks: threat analysis and mitigation for financial institutions,” in RSA White Paper, RSA LLC, Bedford, MA, USA, 2010. View at Google Scholar
  9. The Department of Defense Cyber Strategy, The DOD Cyber Strategy, US Department of Defense, Arlington, VA, USA, 2015, http://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf.
  10. J. Schmidhuber, “Deep learning in neural networks: an overview,” Neural Networks, vol. 61, pp. 85–117, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. Z. Moradi and M. Teshnehlab, “Intrusion detection model in MANETs using ANNs and ANFIS,” in Proceedings of CSIT 2011 International Conference on Telecommunication Technology and Applications, vol. 5, IACSIT Press, Singapore, 2011.
  12. K. El Defrawy and G. Tsudik, “ALARM: anonymous location-aided routing in suspicious MANETs,” IEEE Transactions on Mobile Computing, vol. 10, no. 9, pp. 1345–1358, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. W. S. McCulloch and W. Pitts, “A logical calculus of the ideas immanent in nervous activity,” Bulletin of Mathematical Biophysics, vol. 5, no. 4, pp. 115–133, 1943. View at Publisher · View at Google Scholar · View at Scopus
  14. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” IEEE Wireless Communications, vol. 11, no. 1, pp. 38–47, 2004. View at Publisher · View at Google Scholar · View at Scopus
  15. V. Rajamanickam and D. Veerappan, “Inter cluster communication and rekeying technique for multicast security in mobile ad hoc networks,” IET Information Security, vol. 8, no. 4, pp. 234–239, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. Resource Centre, “Catalogue of B.Tech. Project Reports Batch–2005-09 Abstracts,” Resource Centre, Gandhinagar, India, 2010. View at Google Scholar
  17. S. Kurosawa, H. Nakayama, and N. Kato, “Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method,” International Journal of Network Security, vol. 5, no. 3, pp. 338–346, 2007. View at Google Scholar
  18. R. Thomas, K. Böhm, A. S. Ward, and E. Buchmann, “Malicious behaviour in content-addressable peer-to-peer networks,” in Proceedings of 3rd Annual Communication Networks and Services Research Conference (CNSR’05), pp. 319–326, Halifax, Canada, May 2005.
  19. S. Maag, C. Grepet, and A. Cavalli, “A formal validation methodology for MANET routing protocols based on nodes’ self similarity,” Computer Communications, vol. 31, no. 4, pp. 827–841, 2008. View at Publisher · View at Google Scholar · View at Scopus
  20. A. K. Rai, R. R. Tewari, and S. K. Upadhyay, “Different types of attacks on integrated MANET-Internet communication,” International Journal of Computer Science and Security, vol. 4, no. 3, pp. 265–274, 2010. View at Google Scholar
  21. A. M. Abdalla, A. H. Almazeed, I. A. Saroit, and A. Kotb, “Detection and isolation of packet dropping attacker in MANETs,” International Journal of Advanced Computer Science and Applications, vol. 4, no. 4, 2013. View at Google Scholar
  22. Y. Chen, S. Das, P. Dhar, and A. El-Saddik, “Detecting and preventing IP-spoofed distributed DoS attacks,” International Journal of Network Security, vol. 7, no. 1, pp. 69–80, 2008. View at Google Scholar
  23. A. Mitrokotsa and C. Dimitrakakis, “Intrusion detection in MANET using classification algorithms: the effects of cost and model selection,” Ad Hoc Networks, vol. 11, no. 1, pp. 226–237, 2013. View at Publisher · View at Google Scholar · View at Scopus
  24. S. Dokurer, Simulation of Black Hole Attack in Wireless Ad-Hoc Networks, Atilim University, Ankara, Turkey, 2006.
  25. A. Anand, H. Aggarwal, and R. Rani, “Partially distributed dynamic model for secure and reliable routing in mobile ad hoc networks,” Journal of Communications and Networks, vol. 18, no. 6, pp. 938–947, 2016. View at Publisher · View at Google Scholar · View at Scopus
  26. S. Imran, R. V. Karthick, and P. Visu, “DD-SARP: dynamic data secure anonymous routing protocol for MANETs in attacking environments,” in Proceedings of 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), pp. 39–46, Avadi, Chennai, India, May 2015.
  27. http://ugspace.ug.edu.gh/handle/123456789/7319.
  28. J. Chung and M. Claypool, NS by Example, Worcester Polytechnic Institute, Worcester, MA, USA, 2002.
  29. G. Holmes, A. Donkin, and I. H. Witten, “WEKA: a machine learning workbench,” in Proceedings of Australian New Zealand Intelligent Information Systems Conference (ANZIIS’94), pp. 357–361, Brisbane, QLD, Australia, 1994.