Skip to main content
Log in

Secured Self Organizing Network Architecture in Wireless Personal Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Secured self organizing network is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. In delay tolerant network packets storage exists when there is any link breakage between the nodes in the network so delay is tolerable in this type of network during the data transmission. But this delay is not tolerable in wireless network for voice packet transmission. This evokes the use of wireless networks. In a network, different wireless network topologies are interoperating with each other so the communication across the network is called overlay network. This network is vulnerable to attacks due to mobile behaviour of nodes and frequent changes in topologies of the network. The attacks are wormhole attack and blackhole attack is analysed in this paper. They are critical threats to normal operation in wireless networks which results in the degradation of the network performance. The proposed recovery algorithm for wormhole and the isolation of blackhole will increase the performance of the network. The performance metrics such as throughput, packet delivery ratio, end–end delay and routing overhead of the network are evaluated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Wu, B., Chen, J., Wu, J., & Cardei, M. (2006). A survey on attacks and countermeasures in mobile adhoc networks. In Y. Xiao, X. Shen & D.-Z. Du (Eds.), Wireless/mobile network security (pp. 1–38). Berlin: Springer.

  2. Supriya, K. M. (2012). Mobile Ad Hoc netwoks security attacks and secured routing protocols: A survey. In: N. Meghanathan, N. Chaki & D. Nagamalai (Eds.), Advances in computer science and information technology. Networks and communications. CCSIT 2012. Lecture notes of the institute for computer sciences, Social informatics and telecommunications engineering (Vol. 84, pp. 119–124). Berlin: Springer.

  3. Liang, Y., Poor, H. V., & Ying, L. (2011). Secrecy throughput of MANETs under passive and active attacks. IEEE Transactions On Information Theory, 57(10), 6692–6702.

    Article  MathSciNet  MATH  Google Scholar 

  4. Ren, Y., Chuah, M. C., Yang, J., & Chen, Y. (2010). Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks]. IEEE Wireless Communications, 17(5), 36–42.

    Article  Google Scholar 

  5. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2), 370–380.

    Article  Google Scholar 

  6. Tseng, F. H., Chou, L. D., & Chao, H. C. (2011). A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Computing and Information Sciences, 1(1), 4.

    Article  Google Scholar 

  7. Ghonge, M. M., Jawandhiya, P. M., & Ali, M. S. (2011). Countermeasures of network layer attacks in MANET. In IEEE conference special issue on network security and cryptography.

  8. Nadeem, A., & Howarth, M. P. (2013). A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Communications Surveys & Tutorials, 15(4), 2027–2045.

    Article  Google Scholar 

  9. Maheshwari, R., Gao, J., & Das, S. R. (2007). Detecting wormhole attacks in wireless networks using connectivity information. In Proceedings of IEEE INFOCOM.

  10. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of IEEE INFOCOM.

  11. Su, M.-Y. (2011). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, 34, 107–117.

    Article  Google Scholar 

  12. Li, F., Srinivasan, A., & Wu, J. (2009). Thwarting blackhole attacks in distruption-tolerant networks using encounter tickets. In Proceedings of IEEE INFOCOM.

  13. Djahel, S., Naıt-Abdesselam, F., & Zhang, Z. (2011). Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges. IEEE Communication Surveys, 13(4), 658–672.

    Article  Google Scholar 

  14. Guttoski, P. B., Sunye, M. S., & Silva, F. (2007). Kruskal’s algorithm for query tree optimization. In International database engineering and applications symposium. IEEE.

  15. Euclidean Distance. http://www.pbarett.net/techpapers/euclid.pdf,accessed. 29 March 2015.

  16. Network Simulator 2 & 3. http://www.isi.edu/nsnam/ns.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Smys.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jyothirmai, P., Raj, J.S. & Smys, S. Secured Self Organizing Network Architecture in Wireless Personal Networks. Wireless Pers Commun 96, 5603–5620 (2017). https://doi.org/10.1007/s11277-017-4436-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4436-4

Keywords

Navigation