Welcome to Open Science
Contact Us
Home Books Journals Submission Open Science Join Us News
Enhancement of Dendritic Cell Algorithm for Preventing Sleep Deprivation Attacks
Current Issue
Volume 5, 2018
Issue 5 (September)
Pages: 154-159   |   Vol. 5, No. 5, September 2018   |   Follow on         
Paper in PDF Downloads: 16   Since Oct. 26, 2018 Views: 834   Since Oct. 26, 2018
Authors
[1]
Deji-Akinpelu Omokehinde, Department of Computer Science, University of Ibadan, Ibadan, Nigeria.
[2]
Osunade Oluwaseyintanfunmi, Department of Computer Science, University of Ibadan, Ibadan, Nigeria.
Abstract
Mobile ad-hoc networks (MANETs) are networks formed informally by wireless devices using peer-to-peer communication. It is widely used in places where there is little or no fixed infrastructure. Due to its inherent nature, securing MANET has become so challenging. This has made its operations susceptible to attacks such as Sleep Deprivation Attack (SDA), Barrage Attack and Rushing Attack. The Sleep Deprivation Attack also known as Resource Consumption Attack wastes network resources like battery power and bandwidth; by constantly flooding the network with illegitimate packets. It deprives the participating nodes from entering into sleep mode to conserve their network resources. The Dendritic Cell Algorithm (DCA) has been used by different researchers to detect and prevent attacks in MANETs. This work aimed at enhancing the Dendritic Cell Algorithm to prevent Sleep Deprivation Attacks. This was achieved by integrating inflammation signal into three other input signals (safe, danger and PAMP) that were previously used. The Dendritic Cell Algorithm (DCA) was enhanced by using a fourth sensor for detection. The addition of inflammatory signal to these three already deployed signals improved the Dendritic Cell Algorithm; and led to the development of Enhanced Dendritic Cell Algorithm (EDCA). EDCA increased the rate of detection of Sleep Deprivation Attacks. This is useful in preventing SDA in MANETs.
Keywords
MANET, Sleep Deprivation Attacks (SDA), Resource Consumption Attack, Inflammatory Signal, Enhanced Dendritic Cell Algorithm (EDCA)
Reference
[1]
A. Khannous, A. Rghioui, F. Elouaai and M. Bouhorma, (2016). Securing MANET using the integration of concepts from Diverse Immune using the Integration of Concepts from Diverse Immune Theories” Journal of Theoretical and Applied Information Technology, Vol. 88, No 1, ISSN: 1992-8645.
[2]
A. Aftab, (2016) “Suggesting the Possible Solutions of the most Probable Security Attacks on MANET”, International Journal of Computer Science and Telecommunications, Vol. 7, Issue 3.
[3]
S. Madhurikka and R. Sabitha, (2016) “An Efficient Integral Power-Elector Method with enhanced AODV to avoid Sleep Deprivation in MANET”, Indian Journal of Science and Technology, Vol. 9, ISSN: 0974-5645.
[4]
M. Poonia and G. Sharma, (2015) “Danger Theory Based Model to Prevent Sleep Deprivation Attacks in MANETs”, International Journal of Emerging Research in Management and Technology, Vol. 4, Issue 12, ISSN: 2278-9359.
[5]
P. Chachal, G. Tak, and A. Tomar, (2015) “Comparative Analysis of various Attacks on MANET”, International Journal of Computer Application (0975-8887), Vol. 111, No 12
[6]
S. Jain, (2014) “Security Threats in MANETS: A REVIEW, International Journal of Information Theory (IJIT), Vol. 3, No. 2.
[7]
S. Tayal and V. Grupta, (2013) “A Survey of Attacks on MANET Routing Protocol”, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, Issue 6.
[8]
T. Bhattasali, R. Chaki, S. Sanyal, (2012) “Sleep Deprivation Attack Detection in Wireless Sensor Network”, International Journal of Computer Applications, Vol. 40, No 15.
[9]
X. Zheng and Y. Fang (2012) “Principle and Application of Dendritic Cell Algorithm for Intrusion Detection”, 3rd International Conference on Signal Processing System (ICSPS), Vol. 48, IACSIT Press, Singapore.
[10]
M. Abdelhaq, R. Hassan, M. Ismail, R. Alsaquor, and D. Israf, (2011) “Detecting Sleep Deprivation Attack over MANET using a Danger Theory-Based Algorithm”, International Journal on New Computer Architectures and their Application (IJNCAA) 1 (3): 534-541, ISSN: 2220-9085.
[11]
Y. Mohamed and A. Abdullah, (2009) “Security Mechanism for MANETs”, Journal of Engineering Science and Technology, Vol. 4, No 2, Pg. 231-242.
[12]
A. Ejaz, S. Kashan and M. Waqar, (2006) “Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad hoc Networks”, 5th Conference, AUSCERT2006, Gold Coast, May Proceedings, Australia.
Open Science Scholarly Journals
Open Science is a peer-reviewed platform, the journals of which cover a wide range of academic disciplines and serve the world's research and scholarly communities. Upon acceptance, Open Science Journals will be immediately and permanently free for everyone to read and download.
CONTACT US
Office Address:
228 Park Ave., S#45956, New York, NY 10003
Phone: +(001)(347)535 0661
E-mail:
LET'S GET IN TOUCH
Name
E-mail
Subject
Message
SEND MASSAGE
Copyright © 2013-, Open Science Publishers - All Rights Reserved