Lightweight Security Mechanism to Mitigate Active Attacks in a Mobile Ad-hoc Network

Authors

  • Uthumansa Ahamed Rajarata University of Sri Lanka
  • Shantha Dewsiri Fernando University of Moratuwa

Abstract

Mobile Ad hoc Network (MANET) is a type of Ad hoc network. General properties of MANET open the network to various security threats. Network layer-based Active attacks are widespread and destructive. Available security solutions contain complex calculations. Therefore, the objective of this research is to propose a lightweight security mechanism to enhance the security of data communications between source and destination nodes in a MANET from network layer-based active attack. Blackhole is used as a network layer-based Active attack. The network performance is evaluated using Packet Delivery Ratio (PDR), Average End-to-End Delay (AEED), Throughput, and Simulation Processing Time at Intermediate Nodes (SPTIN). The controller network was used to compare the performance of each network. During the experiment due to the impact of the blackhole attack, compared to the controller network, the PDR was found to be 0.28%, AEED was infinity and Throughput was 0.33%. The performance of the proposed security mechanism was compared with that of the controller network, and the values of PDR, AEED, Throughput, and SPTIN were found to be 98.0825%, 100.9346%, 99.9988%, and 96.5660%, respectively. The data packet delivery ratio was 100.00% compared to that of the controller network. The network that was affected by a blackhole attack showed a higher amount of ADDR than the controller network and the lowest amount of PDR. The network that was affected by the blackhole showed underperformance compared to the controller network. The proposed security mechanism performs well in PDR, AEED, and Throughput compared to the controller network. The AEED and SPTIN values prove that the proposed solution is free from complex calculations. The scope of the solution can be expanded into a lightweight Intruder Detection System to handle different types of security attacks in MANETs.

Author Biography

Shantha Dewsiri Fernando, University of Moratuwa

  • Senior Lecturer Grade I
    • Department of Computer Science & Engineering

References

Lee, F., “Routing in Mobile Ad hoc Networks”. In Wang, X., (Ed.),

Mobile Ad-Hoc Networks: Protocol Design, IntechOpen, 2011.

Perking, P.E., & Royer, E., “Ad-hoc on-demand distance vector routing,”

In Proc 2nd IEEE Workshop on Mobile Computing Systems and

Applications, New Orleans, LA, USA: IEEE, pp. 90-100, 1999.

Rao, K.P.K., & Kalaiarasi, K., “A Survey on IEEE Standards for Mobile

Ad Hoc Networks”, In IOSR Journal of Engineering, 05(02), pp. 55-64,

Ahamed, U., & Fernando, S,. Identifying the Impacts of Active

and Passive Attacks on Network Layer in A Mobile Ad-hoc Network:

A Simulation Perspective. In International Journal of Advanced

Computer Science and Applications(IJACSA), 11(11), 2020,

(doi:10.14569/IJACSA.2020.0111173)

Ahamed, U., & Fernando, S,. Identifying the Impacts of Node Mobility

on Network layer based Active and Passive Attacks in Mobile Ad Hoc

Networks: A Simulation Perspective. In Computing Science, Communication and Security. COMS2 2021. Gujarat, India: Springer, 2021,(to be published).

Khamayseh, Y., Bader, A., Mardini, W., & Yasein, M.B., “A New

Protocol for Detecting Black Hole Nodes in Ad Hoc Networks.” In

International Journal of Communication Networks and Information

Security (IJCNIS), 3(1), 2011.

Panos, C., Ntantogian, C., Malliaros, S., & Xenakis, C.,

“Analyzing, Quantifying, and Detecting the Blackhole attack

in Infrastructure-less Networks”, In Computer Networks, 2016,

(doi:10.1016/j.comnet.2016.12.006)

Semary, A.M.E., & Diab, H., ”BP-AODV: Blackhole Protected AODV

Routing Protocol for MANETs Based on Chaotic Map,” In IEEE Access,

vol. 7, pp. 95197-95211, 2019, (doi:10.1109/ACCESS.2019.2928804)

Arathy, K.S., & Sminesh, C.N., “A Novel Approach for

Detection of Single and Collaborative Black Hole Attacks in

MANET”, In Procedia Technology, Vol. 25, pp. 264-271, 2016,

(doi:10.1016/j.protcy.2016.08.106)

Lachdhaf, S., Mazouzi, M., & Abid, M., “Secured AODV Routing

Protocol for the Detection and Prevention of Black Hole Attack in

Vanet”, In Advanced Computing: An International Journal (ACIJ), 9(1),

Kumar, R., Tripathi, S., & Agrawal, R., ”A secure handshaking aodv

routing protocol (SHS-AODV),” In Proc. 2018 4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad,

India, pp. 1-5, 2018.

Hammamouche, A., Mawloud, O., Nabil, D., & Tari, A., “Lightweight

reputation-based approach against simple and cooperative black-hole attacks for MANET,” In Journal of Information Security and Applications,

Volume 43, pp. 12-20, 2018, (doi:10.1016/j.jisa.2018.10.004)

Dorri, A., Vaseghi, S., & Gharib, O., “DEBH: Detection and Elimination Black Holes in Mobile Ad Hoc Network,” In Computing Research Repository, 2016.

Aziz, N.W., Alsaad S.N., & Hmood, H.K., ”Implementation of

Lightweight Stream Cipher in AODV Routing Protocol for MANET,”

In Proc 2019 First International Conference of Computer and Applied

Sciences (CAS), Baghdad, Iraq, pp. 210-215, 2016.

Rajendran, N., Jawahar, P.K., & Priyadarshini, R., “Cross centric intrusion detection system for secure routing over black hole attacks in

MANETs,” In Computer Communications, Volume 148, pp. 129-135,

, (doi:10.1016/j.comcom.2019.09.005)

Elmahdi, E., Yoo, S.M., & Sharshembiev, K., “Secure and reliable data

forwarding using homomorphic encryption against blackhole attacks

in mobile ad hoc networks,” In Journal of Information Security and

Applications, 51, 2020, (doi:10.1016/j.jisa.2019.102425)

Shrestha, R., Han, K., Choi, D., & Han, S., ”A Novel Cross Layer Intrusion

Detection System in MANET,” In Proc. 24th IEEE International

Conference on Advanced Information Networking and Applications,

Perth, WA, Australia, pp. 647-654, 2010, (doi:10.1109/AINA.2010.52)

Jhaveri, R.H., Patel, S.J., & Jinwala-la, D.C., “A Novel Solution for

Grayhole Attack in AODV Based MANETs”. In Das, V.V., & Stephen,

J., (Eds.) Advances in Communication, Network, and Computing. CNC

Lecture Notes of the Institute for Computer Sciences, Social

Informatics and Telecommunications Engineering, vol 108. Springer,

Berlin, Heidelberg, 2012.

Jhaveri, R.H., Patel S.J., & Jinwa-la D.C., “Improving Route Discovery

for AODV to Prevent Blackhole and Grayhole Attacks in MANETs

INFOCOMP,” In Journal of Computer Science, 11(1), pp. 1-12, 2012

Ibrahim, H.M., Omar, N.M., & William, E.K., “Detection and Removal

of Gray, Black and Cooperative Black Hole Attacks in AODV Technique”

In International Journal of Advanced Computer Science and

Applications (IJACSA), 6(5), 2015.

Dhaka, A., Nandal, A., & Dhaka, R.S., “Gray and Black

Hole Attack Identification Using Control Packets in MANETs,”

In Procedia Computer Science, Volume 54, pp. 83-91, 2016,

(doi:10.1016/j.procs.2015.06.010)

Subba, B., Biswas, S., & Karmakar, S., “Intrusion detection in Mobile

Ad-hoc Networks: Bayesian game formulation,” In Engineering Science

and Technology, an International Journal, 19(2), pp. 782-799, 2016.

Vinayagam, J., Balaswamy, C., & Soundararajan, K., “Certain Investigation

on MANET Security with Routing and Blackhole Attacks

Detection,” In Procedia Computer Science, Volume 165, pp. 196-208,

(doi:10.1016/j.procs.2020.01.091)

Yilmaz, L., Toward Agent-Supported and Agent-Monitored Model-

Driven Simulation Engineering. In Yilmaz, L., (Ed.), Concepts and

Methodologies for Modeling and Simulation. Simulation Foundations,

Methods and Applications. 2015, Springer, Cham, (doi:10.1007/978-3-

-15096-3 1)

Sosa, R., Computational Modelling of Teamwork in Design. In Cash,

P., Stankovi´c, T., & ˇ Storga, M., (Eds.), Experimental Design Research.

, Springer, Cham, 2016, (doi:10.1007/978-3-319-33781-4 10)

The ns Manual [online]. Available at: http://www.isi.edu/nsnam/ns/nsdocumentation.html , 2011. (Accessed: Dec. 01 2021)

Lan, K.C., SAMAN Publications/Talks. Available:

https://www.isi.edu/saman/paper.html , 2003. [Accessed: Dec, 01

Conti, M., “Body, personal, and local ad hoc wireless networks”. The

handbook of ad hoc wireless networks. CRC Press, Inc., USA, pp.3–24,

Beraldi, R., & Baldoni, R., “Unicast routing techniques for mobile ad

hoc networks”. The handbook of ad hoc wireless networks. CRC Press,

Inc., USA, pp. 127–148, 2003.

Downloads

Published

2024-04-19

Issue

Section

Wireless and Mobile Communications