2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2019
DOI: 10.1109/icccnt45670.2019.8944634
|View full text |Cite
|
Sign up to set email alerts
|

Wormhole attack detection in ad hoc network using machine learning technique

Abstract: In this paper, we explore the use of machine learning technique for wormhole attack detection in ad hoc network. This work has categorized into three major tasks. One of our tasks is a simulation of wormhole attack in an ad hoc network environment with multiple wormhole tunnels. A next task is the characterization of packet attributes that lead to feature selection. Consequently, we perform data generation and data collection operation that provide large volume dataset. The final task is applied to machine lea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 20 publications
1
11
0
Order By: Relevance
“…We have extended detection schemes [8,9] with many changes such as compress the datasets, machine learning techniques, reduce self signal from the dataset, different numbers of normal and malicious nodes, etc. Table 1 shows the related works that detect blackhole, wormhole, and other attacks in MANETs.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…We have extended detection schemes [8,9] with many changes such as compress the datasets, machine learning techniques, reduce self signal from the dataset, different numbers of normal and malicious nodes, etc. Table 1 shows the related works that detect blackhole, wormhole, and other attacks in MANETs.…”
Section: Related Workmentioning
confidence: 99%
“…Two attackers in the network try to maintain their locations strategically. They capture the RREQ packets and send RREP to the sender with min hop count [9,10] and max sequence numbers. A malicious node attracts data packets and tunnels them other-end.…”
Section: Wormhole Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…Data collection from real-world-enterprise of MANETs for IDS is not easy work. Therefore, we simulated wormhole attack for the MANET environment using Network Simulator (NS-3), that is presented in [Prasad et al, 2019]. Simulation is performed on 20 normal and 5 malicious nodes, 250-meter radio range, random movement of nodes, 1000*1000 m 2 topology space, and 300 seconds simulation time, which has generated high volume dataset.…”
Section: Wormhole Datasetmentioning
confidence: 99%