PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Lightweight Security Mechanism to Mitigate Active Attacks in a Mobile Ad-hoc Network

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Mobile Ad hoc Network (MANET) is a type of Ad hoc network. General properties of MANET open the network to various security threats. Network layer-based Active attacks are widespread and destructive. Available security solutions contain complex calculations. Therefore, the objective of this research is to propose a lightweight security mechanism to enhance the security of data communications between source and destination nodes in a MANET from network layer-based active attack. Blackhole is used as a network layer-based Active attack. The network performance is evaluated using Packet Delivery Ratio (PDR), Average End-to-End Delay (AEED), Throughput, and Simulation Processing Time at Intermediate Nodes (SPTIN). The controller network was used to compare the performance of each network. During the experiment due to the impact of the blackhole attack, compared to the controller network, the PDR was found to be 0.28%, AEED was infinity and Throughput was 0.33%. The performance of the proposed security mechanism was compared with that of the controller network, and the values of PDR, AEED, Throughput, and SPTIN were found to be 98.0825%, 100.9346%, 99.9988%, and 96.5660%, respectively. The data packet delivery ratio was 100.00% compared to that of the controller network. The network that was affected by a blackhole attack showed a higher amount of ADDR than the controller network and the lowest amount of PDR. The network that was affected by the blackhole showed underperformance compared to the controller network. The proposed security mechanism performs well in PDR, AEED, and Throughput compared to the controller network. The AEED and SPTIN values prove that the proposed solution is free from complex calculations. The scope of the solution can be expanded into a lightweight Intruder Detection System to handle different types of security attacks in MANETs.
Słowa kluczowe
Rocznik
Strony
145--152
Opis fizyczny
Bibliogr. 29 poz., schem., tab., wykr.
Twórcy
  • Faculty of Applied Sciences, Rajarata University of Sri Lanka, Mihintale, Sri Lanka
  • University of Moratuwa, Colombo, Sri Lanka
Bibliografia
  • [1] Lee, F., “Routing in Mobile Ad hoc Networks”. In Wang, X., (Ed.), Mobile Ad-Hoc Networks: Protocol Design, IntechOpen, 2011.
  • [2] Perking, P.E., & Royer, E., “Ad-hoc on-demand distance vector routing,” In Proc 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, USA: IEEE, pp. 90-100, 1999.
  • [3] Rao, K.P.K., & Kalaiarasi, K., “A Survey on IEEE Standards for Mobile Ad Hoc Networks”, In IOSR Journal of Engineering, 05(02), pp. 55-64, 2015.
  • [4] Ahamed, U., & Fernando, S., Identifying the Impacts of Active and Passive Attacks on Network Layer in A Mobile Ad-hoc Network: A Simulation Perspective. In International Journal of Advanced Computer Science and Applications (IJACSA), 11(11), 2020, https://doi.org/10.14569/IJACSA.2020.0111173
  • [5] Ahamed, U., & Fernando, S,. Identifying the Impacts of Node Mobility on Network layer based Active and Passive Attacks in Mobile Ad Hoc Networks: A Simulation Perspective. In Computing Science, Communication and Security. COMS2 2021. Gujarat, India: Springer, 2021, https://doi.org/10.1007/978-3-030-76776-1 18
  • [6] Khamayseh, Y., Bader, A., Mardini, W., & Yasein, M.B., “A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks.” In International Journal of Communication Networks and Information Security (IJCNIS), 3(1), 2011.
  • [7] Panos, C., Ntantogian, C., Malliaros, S., & Xenakis, C., “Analyzing, Quantifying, and Detecting the Blackhole attack in Infrastructure-less Networks”, In Computer Networks, 2016, https://doi.org/10.1016/j.comnet.2016.12.006
  • [8] Semary, A.M.E., & Diab, H., ”BP-AODV: Blackhole Protected AODV Routing Protocol for MANETs Based on Chaotic Map,” In IEEE Access, vol. 7, pp. 95197-95211, 2019, https://doi.org/10.1109/ACCESS.2019.2928804
  • [9] Arathy, K.S., & Sminesh, C.N., “A Novel Approach for Detection of Single and Collaborative Black Hole Attacks in MANET”, In Procedia Technology, Vol. 25, pp. 264-271, 2016, https://doi.org/10.1016/j.protcy.2016.08.106
  • [10] Lachdhaf, S., Mazouzi, M., & Abid, M., “Secured AODV Routing Protocol for the Detection and Prevention of Black Hole Attack in Vanet”, In Advanced Computing: An International Journal (ACIJ), 9(1), 2018.
  • [11] Kumar, R., Tripathi, S., & Agrawal, R., ”A secure handshaking aodv routing protocol (SHS-AODV),” In Proc. 2018 4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, pp. 1-5, 2018.
  • [12] Hammamouche, A., Mawloud, O., Nabil, D., & Tari, A., “Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET,” In Journal of Information Security and Applications, Volume 43, pp. 12-20, 2018, https://doi.org/10.1016/j.jisa.2018.10.004
  • [13] Dorri, A., Vaseghi, S., & Gharib, O., “DEBH: Detection and Elimination Black Holes in Mobile Ad Hoc Network,” In Computing Research Repository, 2016.
  • [14] Aziz, N.W., Alsaad S.N., & Hmood, H.K., ”Implementation of Lightweight Stream Cipher in AODV Routing Protocol for MANET,” In Proc 2019 First International Conference of Computer and Applied Sciences (CAS), Baghdad, Iraq, pp. 210-215, 2016.
  • [15] Rajendran, N., Jawahar, P.K., & Priyadarshini, R., “Cross centric intrusion detection system for secure routing over black hole attacks in MANETs,” In Computer Communications, Volume 148, pp. 129-135, 2019, https://doi.org/10.1016/j.comcom.2019.09.005
  • [16] Elmahdi, E., Yoo, S.M., & Sharshembiev, K., “Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks,” In Journal of Information Security and Applications, 51, 2020, https://doi.org/10.1016/j.jisa.2019.102425
  • [17] Shrestha, R., Han, K., Choi, D., & Han, S., ”A Novel Cross Layer Intrusion Detection System in MANET,” In Proc. 24th IEEE International Conference on Advanced Information Networking and Applications, Perth, WA, Australia, pp. 647-654, 2010, https://doi.org/10.1109/AINA.2010.52
  • [18] Jhaveri, R.H., Patel, S.J., & Jinwala-la, D.C., “A Novel Solution for Grayhole Attack in AODV Based MANETs”. In Das, V.V., & Stephen, J., (Eds.) Advances in Communication, Network, and Computing. CNC 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 108. Springer, Berlin, Heidelberg, 2012.
  • [19] Jhaveri, R.H., Patel S.J., & Jinwa-la D.C., “Improving Route Discovery for AODV to Prevent Blackhole and Grayhole Attacks in MANETs INFOCOMP,” In Journal of Computer Science, 11(1), pp. 1-12, 2012.
  • [20] Ibrahim, H.M., Omar, N.M., & William, E.K., “Detection and Removal of Gray, Black and Cooperative Black Hole Attacks in AODV Technique” In International Journal of Advanced Computer Science and Applications (IJACSA), 6(5), 2015.
  • [21] Dhaka, A., Nandal, A., & Dhaka, R.S., “Gray and Black Hole Attack Identification Using Control Packets in MANETs,” In Procedia Computer Science, Volume 54, pp. 83-91, 2016, https://doi.org/10.1016/j.procs.2015.06.010
  • [22] Subba, B., Biswas, S., & Karmakar, S., “Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation,” In Engineering Science and Technology, an International Journal, 19(2), pp. 782-799, 2016.
  • [23] Vinayagam, J., Balaswamy, C., & Soundararajan, K., “Certain Investigation on MANET Security with Routing and Blackhole Attacks Detection,” In Procedia Computer Science, Volume 165, pp. 196-208, 2019 https://doi.org/10.1016/j.procs.2020.01.091
  • [24] Yilmaz, L., Toward Agent-Supported and Agent-Monitored Model-Driven Simulation Engineering. In Yilmaz, L., (Ed.), Concepts and Methodologies for Modeling and Simulation. Simulation Foundations, Methods and Applications. 2015, Springer, Cham, https://doi.org/10.1007/978-3-319-15096-3_1
  • [25] Sosa, R., Computational Modelling of Teamwork in Design. In Cash, P., Stanković, T., & Štorga, M., (Eds.), Experimental Design Research. 2016, Springer, Cham, 2016, https://doi.org/10.1007/978-3-319-33781-410
  • [26] The ns Manual [online]. Available at: http://www.isi.edu/nsnam/ns/nsdocumentation.html, 2011. [Accessed: Dec. 01 2021]
  • [27] Lan, K.C., SAMAN Publications/Talks. Available: https://www.isi.edu/saman/paper.html, 2003. [Accessed: Dec. 01 2020]
  • [28] Conti, M., “Body, personal, and local ad hoc wireless networks”. The handbook of ad hoc wireless networks. CRC Press, Inc., USA, pp. 3–24, 2003.
  • [29] Beraldi, R., & Baldoni, R., “Unicast routing techniques for mobile ad hoc networks”. The handbook of ad hoc wireless networks. CRC Press, Inc., USA, pp. 127–148, 2003.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-8c7faf7b-43c4-4bf1-9e45-aab81fb0e7e0
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.