Enhancement of Dendritic Cell Algorithm for Preventing Sleep Deprivation Attacks
[1]
Deji-Akinpelu Omokehinde, Department of Computer Science, University of Ibadan, Ibadan, Nigeria.
[2]
Osunade Oluwaseyintanfunmi, Department of Computer Science, University of Ibadan, Ibadan, Nigeria.
Mobile ad-hoc networks (MANETs) are networks formed informally by wireless devices using peer-to-peer communication. It is widely used in places where there is little or no fixed infrastructure. Due to its inherent nature, securing MANET has become so challenging. This has made its operations susceptible to attacks such as Sleep Deprivation Attack (SDA), Barrage Attack and Rushing Attack. The Sleep Deprivation Attack also known as Resource Consumption Attack wastes network resources like battery power and bandwidth; by constantly flooding the network with illegitimate packets. It deprives the participating nodes from entering into sleep mode to conserve their network resources. The Dendritic Cell Algorithm (DCA) has been used by different researchers to detect and prevent attacks in MANETs. This work aimed at enhancing the Dendritic Cell Algorithm to prevent Sleep Deprivation Attacks. This was achieved by integrating inflammation signal into three other input signals (safe, danger and PAMP) that were previously used. The Dendritic Cell Algorithm (DCA) was enhanced by using a fourth sensor for detection. The addition of inflammatory signal to these three already deployed signals improved the Dendritic Cell Algorithm; and led to the development of Enhanced Dendritic Cell Algorithm (EDCA). EDCA increased the rate of detection of Sleep Deprivation Attacks. This is useful in preventing SDA in MANETs.
MANET, Sleep Deprivation Attacks (SDA), Resource Consumption Attack, Inflammatory Signal, Enhanced Dendritic Cell Algorithm (EDCA)
[1]
A. Khannous, A. Rghioui, F. Elouaai and M. Bouhorma, (2016). Securing MANET using the integration of concepts from Diverse Immune using the Integration of Concepts from Diverse Immune Theories” Journal of Theoretical and Applied Information Technology, Vol. 88, No 1, ISSN: 1992-8645.
[2]
A. Aftab, (2016) “Suggesting the Possible Solutions of the most Probable Security Attacks on MANET”, International Journal of Computer Science and Telecommunications, Vol. 7, Issue 3.
[3]
S. Madhurikka and R. Sabitha, (2016) “An Efficient Integral Power-Elector Method with enhanced AODV to avoid Sleep Deprivation in MANET”, Indian Journal of Science and Technology, Vol. 9, ISSN: 0974-5645.
[4]
M. Poonia and G. Sharma, (2015) “Danger Theory Based Model to Prevent Sleep Deprivation Attacks in MANETs”, International Journal of Emerging Research in Management and Technology, Vol. 4, Issue 12, ISSN: 2278-9359.
[5]
P. Chachal, G. Tak, and A. Tomar, (2015) “Comparative Analysis of various Attacks on MANET”, International Journal of Computer Application (0975-8887), Vol. 111, No 12
[6]
S. Jain, (2014) “Security Threats in MANETS: A REVIEW, International Journal of Information Theory (IJIT), Vol. 3, No. 2.
[7]
S. Tayal and V. Grupta, (2013) “A Survey of Attacks on MANET Routing Protocol”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, Issue 6.
[8]
T. Bhattasali, R. Chaki, S. Sanyal, (2012) “Sleep Deprivation Attack Detection in Wireless Sensor Network”, International Journal of Computer Applications, Vol. 40, No 15.
[9]
X. Zheng and Y. Fang (2012) “Principle and Application of Dendritic Cell Algorithm for Intrusion Detection”, 3rd International Conference on Signal Processing System (ICSPS), Vol. 48, IACSIT Press, Singapore.
[10]
M. Abdelhaq, R. Hassan, M. Ismail, R. Alsaquor, and D. Israf, (2011) “Detecting Sleep Deprivation Attack over MANET using a Danger Theory-Based Algorithm”, International Journal on New Computer Architectures and their Application (IJNCAA) 1 (3): 534-541, ISSN: 2220-9085.
[11]
Y. Mohamed and A. Abdullah, (2009) “Security Mechanism for MANETs”, Journal of Engineering Science and Technology, Vol. 4, No 2, Pg. 231-242.
[12]
A. Ejaz, S. Kashan and M. Waqar, (2006) “Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad hoc Networks”, 5th Conference, AUSCERT2006, Gold Coast, May Proceedings, Australia.