Lightweight Security Mechanism to Mitigate Active Attacks in a Mobile Ad-hoc Network
Abstract
Mobile Ad hoc Network (MANET) is a type of Ad hoc network. General properties of MANET open the network to various security threats. Network layer-based Active attacks are widespread and destructive. Available security solutions contain complex calculations. Therefore, the objective of this research is to propose a lightweight security mechanism to enhance the security of data communications between source and destination nodes in a MANET from network layer-based active attack. Blackhole is used as a network layer-based Active attack. The network performance is evaluated using Packet Delivery Ratio (PDR), Average End-to-End Delay (AEED), Throughput, and Simulation Processing Time at Intermediate Nodes (SPTIN). The controller network was used to compare the performance of each network. During the experiment due to the impact of the blackhole attack, compared to the controller network, the PDR was found to be 0.28%, AEED was infinity and Throughput was 0.33%. The performance of the proposed security mechanism was compared with that of the controller network, and the values of PDR, AEED, Throughput, and SPTIN were found to be 98.0825%, 100.9346%, 99.9988%, and 96.5660%, respectively. The data packet delivery ratio was 100.00% compared to that of the controller network. The network that was affected by a blackhole attack showed a higher amount of ADDR than the controller network and the lowest amount of PDR. The network that was affected by the blackhole showed underperformance compared to the controller network. The proposed security mechanism performs well in PDR, AEED, and Throughput compared to the controller network. The AEED and SPTIN values prove that the proposed solution is free from complex calculations. The scope of the solution can be expanded into a lightweight Intruder Detection System to handle different types of security attacks in MANETs.
References
Lee, F., “Routing in Mobile Ad hoc Networks”. In Wang, X., (Ed.),
Mobile Ad-Hoc Networks: Protocol Design, IntechOpen, 2011.
Perking, P.E., & Royer, E., “Ad-hoc on-demand distance vector routing,”
In Proc 2nd IEEE Workshop on Mobile Computing Systems and
Applications, New Orleans, LA, USA: IEEE, pp. 90-100, 1999.
Rao, K.P.K., & Kalaiarasi, K., “A Survey on IEEE Standards for Mobile
Ad Hoc Networks”, In IOSR Journal of Engineering, 05(02), pp. 55-64,
Ahamed, U., & Fernando, S,. Identifying the Impacts of Active
and Passive Attacks on Network Layer in A Mobile Ad-hoc Network:
A Simulation Perspective. In International Journal of Advanced
Computer Science and Applications(IJACSA), 11(11), 2020,
(doi:10.14569/IJACSA.2020.0111173)
Ahamed, U., & Fernando, S,. Identifying the Impacts of Node Mobility
on Network layer based Active and Passive Attacks in Mobile Ad Hoc
Networks: A Simulation Perspective. In Computing Science, Communication and Security. COMS2 2021. Gujarat, India: Springer, 2021,(to be published).
Khamayseh, Y., Bader, A., Mardini, W., & Yasein, M.B., “A New
Protocol for Detecting Black Hole Nodes in Ad Hoc Networks.” In
International Journal of Communication Networks and Information
Security (IJCNIS), 3(1), 2011.
Panos, C., Ntantogian, C., Malliaros, S., & Xenakis, C.,
“Analyzing, Quantifying, and Detecting the Blackhole attack
in Infrastructure-less Networks”, In Computer Networks, 2016,
(doi:10.1016/j.comnet.2016.12.006)
Semary, A.M.E., & Diab, H., ”BP-AODV: Blackhole Protected AODV
Routing Protocol for MANETs Based on Chaotic Map,” In IEEE Access,
vol. 7, pp. 95197-95211, 2019, (doi:10.1109/ACCESS.2019.2928804)
Arathy, K.S., & Sminesh, C.N., “A Novel Approach for
Detection of Single and Collaborative Black Hole Attacks in
MANET”, In Procedia Technology, Vol. 25, pp. 264-271, 2016,
(doi:10.1016/j.protcy.2016.08.106)
Lachdhaf, S., Mazouzi, M., & Abid, M., “Secured AODV Routing
Protocol for the Detection and Prevention of Black Hole Attack in
Vanet”, In Advanced Computing: An International Journal (ACIJ), 9(1),
Kumar, R., Tripathi, S., & Agrawal, R., ”A secure handshaking aodv
routing protocol (SHS-AODV),” In Proc. 2018 4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad,
India, pp. 1-5, 2018.
Hammamouche, A., Mawloud, O., Nabil, D., & Tari, A., “Lightweight
reputation-based approach against simple and cooperative black-hole attacks for MANET,” In Journal of Information Security and Applications,
Volume 43, pp. 12-20, 2018, (doi:10.1016/j.jisa.2018.10.004)
Dorri, A., Vaseghi, S., & Gharib, O., “DEBH: Detection and Elimination Black Holes in Mobile Ad Hoc Network,” In Computing Research Repository, 2016.
Aziz, N.W., Alsaad S.N., & Hmood, H.K., ”Implementation of
Lightweight Stream Cipher in AODV Routing Protocol for MANET,”
In Proc 2019 First International Conference of Computer and Applied
Sciences (CAS), Baghdad, Iraq, pp. 210-215, 2016.
Rajendran, N., Jawahar, P.K., & Priyadarshini, R., “Cross centric intrusion detection system for secure routing over black hole attacks in
MANETs,” In Computer Communications, Volume 148, pp. 129-135,
, (doi:10.1016/j.comcom.2019.09.005)
Elmahdi, E., Yoo, S.M., & Sharshembiev, K., “Secure and reliable data
forwarding using homomorphic encryption against blackhole attacks
in mobile ad hoc networks,” In Journal of Information Security and
Applications, 51, 2020, (doi:10.1016/j.jisa.2019.102425)
Shrestha, R., Han, K., Choi, D., & Han, S., ”A Novel Cross Layer Intrusion
Detection System in MANET,” In Proc. 24th IEEE International
Conference on Advanced Information Networking and Applications,
Perth, WA, Australia, pp. 647-654, 2010, (doi:10.1109/AINA.2010.52)
Jhaveri, R.H., Patel, S.J., & Jinwala-la, D.C., “A Novel Solution for
Grayhole Attack in AODV Based MANETs”. In Das, V.V., & Stephen,
J., (Eds.) Advances in Communication, Network, and Computing. CNC
Lecture Notes of the Institute for Computer Sciences, Social
Informatics and Telecommunications Engineering, vol 108. Springer,
Berlin, Heidelberg, 2012.
Jhaveri, R.H., Patel S.J., & Jinwa-la D.C., “Improving Route Discovery
for AODV to Prevent Blackhole and Grayhole Attacks in MANETs
INFOCOMP,” In Journal of Computer Science, 11(1), pp. 1-12, 2012
Ibrahim, H.M., Omar, N.M., & William, E.K., “Detection and Removal
of Gray, Black and Cooperative Black Hole Attacks in AODV Technique”
In International Journal of Advanced Computer Science and
Applications (IJACSA), 6(5), 2015.
Dhaka, A., Nandal, A., & Dhaka, R.S., “Gray and Black
Hole Attack Identification Using Control Packets in MANETs,”
In Procedia Computer Science, Volume 54, pp. 83-91, 2016,
(doi:10.1016/j.procs.2015.06.010)
Subba, B., Biswas, S., & Karmakar, S., “Intrusion detection in Mobile
Ad-hoc Networks: Bayesian game formulation,” In Engineering Science
and Technology, an International Journal, 19(2), pp. 782-799, 2016.
Vinayagam, J., Balaswamy, C., & Soundararajan, K., “Certain Investigation
on MANET Security with Routing and Blackhole Attacks
Detection,” In Procedia Computer Science, Volume 165, pp. 196-208,
(doi:10.1016/j.procs.2020.01.091)
Yilmaz, L., Toward Agent-Supported and Agent-Monitored Model-
Driven Simulation Engineering. In Yilmaz, L., (Ed.), Concepts and
Methodologies for Modeling and Simulation. Simulation Foundations,
Methods and Applications. 2015, Springer, Cham, (doi:10.1007/978-3-
-15096-3 1)
Sosa, R., Computational Modelling of Teamwork in Design. In Cash,
P., Stankovi´c, T., & ˇ Storga, M., (Eds.), Experimental Design Research.
, Springer, Cham, 2016, (doi:10.1007/978-3-319-33781-4 10)
The ns Manual [online]. Available at: http://www.isi.edu/nsnam/ns/nsdocumentation.html , 2011. (Accessed: Dec. 01 2021)
Lan, K.C., SAMAN Publications/Talks. Available:
https://www.isi.edu/saman/paper.html , 2003. [Accessed: Dec, 01
Conti, M., “Body, personal, and local ad hoc wireless networks”. The
handbook of ad hoc wireless networks. CRC Press, Inc., USA, pp.3–24,
Beraldi, R., & Baldoni, R., “Unicast routing techniques for mobile ad
hoc networks”. The handbook of ad hoc wireless networks. CRC Press,
Inc., USA, pp. 127–148, 2003.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 International Journal of Electronics and Telecommunications
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on https://creativecommons.org/licenses/by/4.0/.
2. Author’s Warranties
The author warrants that the article is original, written by stated author/s, has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author/s. The undersigned also warrants that the manuscript (or its essential substance) has not been published other than as an abstract or doctorate thesis and has not been submitted for consideration elsewhere, for print, electronic or digital publication.
3. User Rights
Under the Creative Commons Attribution license, the author(s) and users are free to share (copy, distribute and transmit the contribution) under the following conditions: 1. they must attribute the contribution in the manner specified by the author or licensor, 2. they may alter, transform, or build upon this work, 3. they may use this contribution for commercial purposes.
4. Rights of Authors
Authors retain the following rights:
- copyright, and other proprietary rights relating to the article, such as patent rights,
- the right to use the substance of the article in own future works, including lectures and books,
- the right to reproduce the article for own purposes, provided the copies are not offered for sale,
- the right to self-archive the article
- the right to supervision over the integrity of the content of the work and its fair use.
5. Co-Authorship
If the article was prepared jointly with other authors, the signatory of this form warrants that he/she has been authorized by all co-authors to sign this agreement on their behalf, and agrees to inform his/her co-authors of the terms of this agreement.
6. Termination
This agreement can be terminated by the author or the Journal Owner upon two months’ notice where the other party has materially breached this agreement and failed to remedy such breach within a month of being given the terminating party’s notice requesting such breach to be remedied. No breach or violation of this agreement will cause this agreement or any license granted in it to terminate automatically or affect the definition of the Journal Owner. The author and the Journal Owner may agree to terminate this agreement at any time. This agreement or any license granted in it cannot be terminated otherwise than in accordance with this section 6. This License shall remain in effect throughout the term of copyright in the Work and may not be revoked without the express written consent of both parties.
7. Royalties
This agreement entitles the author to no royalties or other fees. To such extent as legally permissible, the author waives his or her right to collect royalties relative to the article in respect of any use of the article by the Journal Owner or its sublicensee.
8. Miscellaneous
The Journal Owner will publish the article (or have it published) in the Journal if the article’s editorial process is successfully completed and the Journal Owner or its sublicensee has become obligated to have the article published. Where such obligation depends on the payment of a fee, it shall not be deemed to exist until such time as that fee is paid. The Journal Owner may conform the article to a style of punctuation, spelling, capitalization and usage that it deems appropriate. The Journal Owner will be allowed to sublicense the rights that are licensed to it under this agreement. This agreement will be governed by the laws of Poland.
By signing this License, Author(s) warrant(s) that they have the full power to enter into this agreement. This License shall remain in effect throughout the term of copyright in the Work and may not be revoked without the express written consent of both parties.