access icon free Restricted Boltzmann machine-based cognitive protocol for secure routing in software defined wireless networks

Secure and stable routing is a critical issue in a conventional network environment, as the control and data planes are integrated. An intelligent routing is highly essential to provide an attack free network to its intended users. The programmable software defined network is an emerging network paradigm in which the security policies and the forwarding rules are implemented in the controller via North Bound Interface. This study incorporates a cognitive neural network learning algorithm namely restricted Boltzmann machine (RBM), to detect the routing-based distributed denial of service attacks in dynamic source routing (DSR) protocol. RBM is a stochastic and unsupervised learning algorithm that self-learns the network conditions by using its reasoning capability and segregates malicious routes in the route cache using context-aware trust metrics such as reputation and energy consumption implemented in North Bound Application Programming Interface. The results show that a cognitive DSR protocol provides secure routing by increased packet delivery ratio, decreased end-to-end delay, reduced energy consumption and accurate detection of malicious routes compared with the conventional DSR protocol.

Inspec keywords: cache storage; Boltzmann machines; telecommunication computing; application program interfaces; stochastic processes; software radio; telecommunication security; routing protocols; radio networks; unsupervised learning

Other keywords: stochastic learning algorithm; energy consumption; RBM; data planes; security policies; routing-based distributed denial of service attack detection; cognitive DSR protocol; dynamic source routing protocol; attack free network; restricted Boltzmann machine; unsupervised learning algorithm; end-to-end delay; route cache; north bound application programming interface; packet delivery ratio; control planes; cognitive neural network learning algorithm; secure routing; forwarding rules; software defined wireless networks; network environment; intelligent routing; context-aware trust metrics

Subjects: Communication network design, planning and routing; Other topics in statistics; Communications computing; Neural computing techniques; Other topics in statistics; Protocols; General utility programs; Radio links and equipment

References

    1. 1)
      • 13. Dhurandher, S.K., Obaidat, M.S., Verma, K., et al: ‘Faces: friend-based ad hoc routing using challenges to establish security in MANETs systems’, IEEE Syst. J., 2011, 5, (2), pp. 176178.
    2. 2)
      • 15. He, Q., Wu, D., Khosla, P.: ‘SORI: A secure and objective reputation-based incentive scheme for Ad-Hoc networks’. IEEE Int. Conf. on Wireless Communication and Networking, Atlanta, GA, USA, March 2004, vol. 2, pp. 255265.
    3. 3)
      • 3. Nadeem, A., Howrath, M.: ‘A survey of MANET intrusion detection and prevention approaches for network layer attacks’, IEEE Commun. Surv. Tutorials, 2013, 15, (4), pp. 20272045.
    4. 4)
      • 6. Li, W., Meng, W., Kwok, L.F.: ‘A survey on OpenFlow-based software defined networks: security challenges and countermeasures’, J. Netw. Comput. Appl., 2016, 68, pp. 126139.
    5. 5)
      • 7. Kim, H., Feamster, N.: ‘Improving network management with software defined networking’, IEEE Commun. Mag., 2013, 51, (2), pp. 114119.
    6. 6)
      • 4. Jammal, M., Singh, T., Shami, A., et al: ‘Software defined networking: state of the art and research challenges’, Comput. Netw., 2014, 72, pp. 7498.
    7. 7)
      • 21. Ayachi, M.A., Bidan, C., Abbes, T., et al: ‘Misbehavior detection using implicit trust relations in the AODV routing protocol’. Int. Symp. on Trusted Comp, Vancouver, BC, Canada, August 2009, vol. 2, pp. 745752.
    8. 8)
      • 24. Saurin, J., Nikhil, N.: ‘A light-Weight trust based mobility aware routing algorithm for mobile Ad Hoc networks’, Int. J. Comput. Appl., 2014, 97, (14), pp. 2630.
    9. 9)
      • 23. Nasipuri, A., Samir, R.: ‘On-demand multipath routing for mobile ad hoc network’. Proc. IEEE Int. Conf. on Computer Communications and Networks, Boston, MA, USA, 1999, pp. 6470.
    10. 10)
      • 19. Mahmoud, A., Sameh, A., El-Kassas, S.: ‘Reputed authenticated routing for ad hoc networks protocol’. Proc. IEEE. Int. Conf. on Mobile Adhoc and Sensor Systems, Washington, DC, 2005, pp. 18.
    11. 11)
      • 25. Amokrane, A., Langar, R., Boutaba, R., et al: ‘Flow-Based energy efficient campus networks’, IEEE Trans. Netw. Serv. Manage., 2015, 12, (4), pp. 565579.
    12. 12)
      • 18. Moe, M.E., Helvik, B.E., Knapskog, S.J.: ‘TSR: Trust-based secure MANET routing using HMMs’, Proc. ACM. Symp. on QoS and Security for Wireless and Mobile Networks, New York, NY, USA, October 2008, pp. 8390.
    13. 13)
      • 12. Wei, Z., Tang, H., Yu, F.R., et al: ‘Security enhancements for mobile Ad Hoc networks with trust management using uncertain reasoning’, IEEE Trans. Veh. Technol., 2014, 63, (9), pp. 46474658.
    14. 14)
      • 1. Hari, K.K.K.: ‘On demand temporary route recovery for frequent link failures in adhoc networks’. IEEE Trendz in Information Sciences and Computing, 2010, pp. 181185.
    15. 15)
      • 2. Patil, M., Naik, S.R.R., Nikam, V.B., et al: ‘Extended ECDSR protocol for energy efficient MANET’. Proc. Int. Conf. Advanced Computing and Communication Systems, Coimbatore, India, January 2015, pp. 16.
    16. 16)
      • 14. Marti, S., Giuli, T.J., Lai, K., et al: ‘Mitigating routing misbehavior in mobile ad hoc networks’. Proc. ACM. Int. Conf. on Mobile Computing and Networking, Boston, Massachusetts, USA, August 2000, pp. 255265.
    17. 17)
      • 8. Karakus, M., Durresi, A.: ‘A survey: control plane scalability issues and approaches in software-defined networking’, Comput. Netw., 2016, 112, pp. 279293.
    18. 18)
      • 5. Nunes, B.A.A., Mendonca, M., Nguyen, X.N., et al: ‘A survey of software-defined networking: past, present and future of programmable networks’, IEEE Commun. Surv. Tutorials, 2014, 16, (3), pp. 16171634.
    19. 19)
      • 20. Pirzada, A.A., Datta, A., McDonald, C.: ‘Incorporating trust and reputation in the DSR protocol for dependable routing’, Comput. Commun., 2006, 29, (15), pp. 28062821.
    20. 20)
      • 16. Zouridaki, C., Mark, B.L., Hejmo, M., et al: ‘A quantitative trust establishment framework for reliable data packet delivery in MANETs’. Proc. ACM. Workshop on Security of Adhoc and Sensor Networks, Alexandria, VA, USA, 2005, vol. 15, (1), pp. 110.
    21. 21)
      • 9. MohanaPriya, P., Mercy Shalinie, S., Pandey, T.: ‘Restricted Boltzmann machine based energy efficient cognitive network’. Proc. Int. Conf. on Innovations in Bio-Inspired Computing and Applications, Kochi, India, 2016, vol. 424, pp. 463472.
    22. 22)
      • 10. Fiore, U., Palmieri, F., Castiglione, A., et al: ‘Network anomaly detection with the restricted Boltzmann machine’, Neurocomputing, 2013, 122, pp. 1323.
    23. 23)
      • 11. Thomas, R., Friend, D., Dasilva, L., et al: ‘Cognitive networks: adaptation and learning to achieve end-to-end performance objectives’, IEEE Commun. Mag., 2005, 44, (12), pp. 110.
    24. 24)
      • 22. Adnane, A., Bidan, C., de Sousa, R.T.: ‘Trust-based countermeasures for securing OLSR protocol’. Proc. Int. Conf. on Computational Science and Engineering, Vancouver, BC, Canada, August 2009, vol. 2, pp. 745752.
    25. 25)
      • 17. Sun, Y.L., Yu, W., Han, Z., et al: ‘Information theoretic framework of trust modeling and evaluation for ad hoc networks’, IEEE J. Sel. Areas Commun., 2006, 24, (2), pp. 305317.
    26. 26)
      • 26. Riley, G.F., Henderson, T.R.: ‘The ns-3 network simulator’, in Modeling and tools for network simulation (Springer, Berlin, Heidelberg, 2010), pp. 1534.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-net.2017.0054
Loading

Related content

content/journals/10.1049/iet-net.2017.0054
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading