Open Access Open Access  Restricted Access Subscription Access

Co-Ordinated Blackhole and Grayhole Attack Detection Using Smart & Secure Ad Hoc On-Demand Distance Vector Routing Protocol in MANETs


Affiliations
1 Department of Electronics and Communication Engineering, Atria Institute of Technology, Bangalore, India
2 Department of Electronics and Telecommunication Engineering, Ramaiah Institute of Technology, Bangalore, India
 

Mobile Ad Hoc Network (MANET) devices are powered from battery and due to infrastructure-less feature, the security and energy consumption are major concerns. Most of the researchers have assumed that the Cluster Head (CH) nodes are benign and frequently undergo cluster re-election, which shortens the network lifetime. Smart & Secure Ad Hoc On-Demand Distance Vector algorithm (S2-AODV) is proposed with secondary CH (S-CH), primary CH (P-CH) and a super cluster head (SCH) node along with the other nodes. Modified-AODV (M-AODV) is used for neighbor discovery. Weight-based clustering algorithm is proposed, with the primary and a secondary CH node to enhance the network efficiency. S2-AODV enhances security using Honey-pot AODV (H-AODV) and avoids the CH re-election process enhancing the overall network lifetime. The proposed algorithm works in off-line mode and on-line mode. In off-line mode the various Wi-Fi parameters like Received Signal Strength Indicator (RSSI), transmission power, battery level, distance and number of transmissions retries are collected from each CH node in the network. A look-up table indicating the transmission power (TXP) to be set by the CH nodes is determined by machine learning (ML) algorithms. This table is circulated among every CH node by SCH node in the network. Due to this process the intermittent reelection of the P-CH and S-CH nodes can be avoided, enhancing the network lifetime. In on-line mode, SCH executes H-AODV to identify and remove the malicious CH (black hole / gray hole) nodes (ns-2.34).

Keywords

MANETs, AODV, M-AODV, H-AODV, Cluster, Black Hole Attack.
User
Notifications
Font Size

  • S. Uppalapati, ‘‘Energy-efficient heterogeneous optimization routing protocol for wireless sensor network,’’ Instrum. Mesure Metrol., vol. 19, no. 5, pp. 391–397, Nov. 2020.
  • S. Bharany, S. Sharma, S. Badotra, O. I. Khalaf, Y. Alotaibi, S. Alghamdi, and F. Alassery, ‘‘Energy-efficient clustering scheme for flying Ad-Hoc networks using an optimized LEACH protocol,’’ Energies, vol. 14, no. 19, p. 6016, Sep. 2021.
  • U. Srilakshmi, N. Veeraiah, Y. Alotaibi, S. A. Alghamdi, O. I. Khalaf, and B. V. Subbayamma, ‘‘An improved hybrid secure multipath routing protocol for MANET,’’ IEEE Access, vol. 9, pp. 163043–163053, 2021.
  • B. Rajkumar and G. Narsimha, ‘‘Secure multipath routing and data transmission in MANET,’’ Int. J. Netw. Virtual Organisations, vol. 16, no. 3, pp. 236–252, 2016.
  • G. Anjaneyulu, V. M. Viswanatham, and B. Venkateswarlu, ‘‘Secured and authenticated transmission of data using multipath routing in mobile AD-HOC networks,’’ Adv. Appl. Sci. Res., vol. 2, no. 4, pp. 177–186, 2011.
  • R. Prasad P and S. Shankar, ‘‘Efficient performance analysis of energy aware on demand routing protocol in mobile Ad Hoc network,’’ Eng. Rep., vol. 2, no. 3, p. e12116, Mar. 2020.
  • S. V. Kumar and V. AnurathaEnergy, ‘‘Efficient routing for MANET using optimized hierarchical routing algorithm (Ee-Ohra),’’ Int. J. Sci. Technol. Res., vol. 9, no. 2, pp. 2157–2162, Feb. 2020.
  • N.-C. Wang and Y.-L. Su, ‘‘A power-aware multicast routing protocol for mobile Ad Hoc networks with mobility prediction,’’ presented at the IEEE Conf. Local Comput. Netw. 30th Anniversary (LCN)l, Sydney, NSW, Australia, Nov. 17, 2005, p. 8 and 417.
  • R. Rout, P. Parida, Y. Alotaibi, S. Alghamdi, and O. I. Khalaf, ‘‘Skin lesion extraction using multiscale morphological local variance reconstruction-based watershed transform and fast fuzzy C-Means clustering,’’ Symmetry, vol. 13, no. 11, p. 2085, Nov. 2021.
  • U. Venkanna, J. K. Agarwal, and R. L. Velusamy, ‘‘A cooperative routing for MANET based on distributed trust and energy management,’’ Wireless Pers. Commun., vol. 81, no. 3, pp. 961–979, Apr. 2015.
  • M. Bharti, S. Rani and P. Singh, "Security Attacks in MANET: A Complete Analysis," 2022 6th International Conference on Devices, Circuits and Systems (ICDCS), 2022, pp. 384-387, doi: 10.1109/ICDCS54290.2022.9780760.
  • M. Bharti, S. Rani and P. Singh, "Security Attacks in MANET: A Complete Analysis," 2022 6th International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India, 2022, pp. 384-387, doi: 10.1109/ICDCS54290.2022.9780760..
  • R. I. Al-Essa and G. A. Al-Suhail, "Mobility and Transmission Power of AODV Routing Protocol in MANET," 2022 2nd International Conference on Computing and Machine Intelligence (ICMI), 2022, pp. 1-5, doi: 10.1109/ICMI55296.2022.9873686.
  • M. D. Chawhan, K. Karmarkar, G. Almelkar, D. Borkar, K. D. Kulat and B. Neole, "Identification and prevention of Gray hole attack using IDS mechanism in MANET," 2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22), 2022, pp. 1-6, doi: 10.1109/ICETET-SIP-2254415.2022.9791594.
  • M. M. Hamdi et al., "A study review on Gray and Black Hole in Mobile Ad Hoc Networks (MANETs)," 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), 2022, pp. 1-6, doi: 10.1109/HORA55278.2022.9800011.
  • M. P. Kumar, M. M. Kumar, S. Shobana, L. Padmanaban, A. Nageswaran and R. Krishnamoorthy, "Enhanced Secure Routing in MANET using Collaborative Machine Learning Approach," 2022 8th International Conference on Smart Structures and Systems (ICSSS), 2022, pp. 1-6, doi: 10.1109/ICSSS54381.2022.9782205.
  • D. N. M. Hoang, J. M. Rhee and S. Y. Park, "Fault-Tolerant Ad Hoc On-Demand Routing Protocol for Mobile Ad Hoc Networks," in IEEE Access, vol. 10, pp. 111337-111350, 2022, doi: 10.1109/ACCESS.2022.3216066.
  • P. Upadhyay, V. Marriboina, S. Kumar, S. Kumar and M. A. Shah, "An Enhanced Hybrid Glowworm Swarm Optimization Algorithm for Traffic-Aware Vehicular Networks," in IEEE Access, vol. 10, pp. 110136-110148, 2022, doi: 10.1109/ACCESS.2022.3211653.
  • U. Srilakshmi, S. A. Alghamdi, V. A. Vuyyuru, N. Veeraiah and Y. Alotaibi, "A Secure Optimization Routing Algorithm for Mobile Ad Hoc Networks," in IEEE Access, vol. 10, pp. 14260-14269, 2022, doi: 10.1109/ACCESS.2022.3144679.
  • X. Chen, G. Sun, T. Wu, L. Liu, H. Yu and M. Guizani, "RANCE: A Randomly Centralized and On-Demand Clustering Protocol for Mobile Ad Hoc Networks," in IEEE Internet of Things Journal, vol. 9, no. 23, pp. 23639-23658, 1 Dec.1, 2022, doi: 10.1109/JIOT.2022.3188679.
  • M. Sharma, P. Kumar and R. S. Tomar, "Weight-Based Clustering Algorithm for Military Vehicles Communication in VANET," in SAIEE Africa Research Journal, vol. 114, no. 1, pp. 25-34, March 2023, doi: 10.23919/SAIEE.2023.9962790.
  • M. M. Gaber and M. A. Azer, "Blackhole Attack effect on MANETs' Performance," 2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), 2022, pp. 397-401, doi: 10.1109/MIUCC55081.2022.9781680.
  • N. Veeraiah, O. I. Khalaf, C. V. Prasad, Y. Alotaibi, A. Alsufyani, S. A. Alghamdi, and N. Alsufyani, ‘‘Trust aware secure energy efficient hybrid protocol for MANET,’’ IEEE Access, vol. 9, pp. 120996–121005, 2021.
  • A. Mallikarjuna and V. C. Patil, ‘‘PUSR: Position update secure routing protocol for MANET,’’ Int. J. Intell. Eng. Syst., vol. 14, no. 1, pp. 93–102, Feb. 2021.
  • M. Rajashanthi and K. Valarmathi, ‘‘A secure trusted multipath routing and optimal fuzzy logic for enhancing QoS in MANETs,’’ Wireless Pers. Commun., vol. 112, no. 1, pp. 75–90, May 2020.
  • R. Nithya, K. Amudha, A. S. Musthafa, D. K. Sharma, E. H. Ramirez-Asis, P. Velayutham, V. Subramaniyaswamy, and S. Sengan, ‘‘An optimized fuzzy based ant colony algorithm for 5G-MANET,’’ CMC-Comput., Mater. Continua, vol. 70, no. 1, pp. 1069–1087, 2022
  • S. R. Halhalli, S. R. Sugave, and B. N. Jagdale, ‘‘Optimisation driven-based secure routing in MANET using atom whale optimisation algorithm,’’ Int. J. Commun. Netw. Distrib. Syst., vol. 27, no. 1, p. 77, 2021.
  • V. Alappatt and J. P. P. M., ‘‘Trust-based energy efficient secure multipath routing in MANET using LF-SSO and SH2E,’’ Int. J. Comput. Netw. Appl., vol. 8, no. 4, p. 400, Aug. 2021.
  • K. K. Thangadorai et al., "Intelligent and Adaptive Machine Learning-based Algorithm for Power Saving in Mobile Hotspot," 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), 2020, pp. 1-6, doi: 10.1109/CCNC46108.2020.9045535.
  • Jie Gu, Shan Lu,An effective intrusion detection approach using SVM with naïve Bayes feature embedding, Computers & Security,Volume 103,2021,102158,ISSN 0167-4048, https://doi.org/10.1016/j.cose.2020.102158.
  • J. Ryu and S. Kim, "Reputation-Based Opportunistic Routing Protocol Using Q-Learning for MANET Attacked by Malicious Nodes," in IEEE Access, doi: 10.1109/ACCESS.2023.3242608.
  • N. Veeraiah and B. T. Krishna, ‘‘An approach for optimal-secure multi-path routing and intrusion detection in MANET,’’ Evol. Intell., vol. 5, pp. 1–15, Mar. 2020.
  • S. Palanisamy, B. Thangaraju, O. I. Khalaf, Y. Alotaibi, S. Alghamdi, and F. Alassery, ‘‘A novel approach of design and analysis of a hexagonal fractal antenna array (HFAA) for next-generation wireless communication,’’ Energies, vol. 14, no. 19, p. 6204, Sep. 2021.
  • Sampada H K, Dr. Shobha K R.: Performance Analysis of Energy Efficient MANETs- using MODIFIED AODV (M-AODV). In: © Springer Nature Singapore Pte Ltd. 2019.S. Lecture Notes on Data Engineering and Communications Technologies 15, https://doi.org/10.1007/978-981-10-8681-6_9.
  • Sampada H K, Shobha K R., “Cluster-Based – Multiple Malicious Node Detection using Honeypot AODV (H-AODV) in MANETs”, Int. J. of Communication Networks and Distributed Systems, 30 (1), PP:1-29, 2023.
  • S. K. Prasad, S. Gupta, R. B. Singh and T. Sharma, "Performance Testing of AODV using Channel Fading for MANETs," 2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON), 2022, pp. 811-816, doi: 10.1109/COM-IT-CON54601.2022.9850951.
  • A. Jain, U. Prajapati and P. Chouhan, "Trust based mechanism with AODV protocol for prevention of black-hole attack in MANET scenario," 2016 Symposium on Colossal Data Analysis and Networking (CDAN), 2016, pp. 1-4, doi: 10.1109/CDAN.2016.7570866.
  • Naseeruddin and V. C. Patil, "Performance evaluation of MANET protocols: A propagation model perspective," 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), 2016, pp. 55-61, doi: 10.1109/ICATCCT.2016.7911965.
  • Altaf Hussain, “ERWPM-MANET: Evaluation of Radio Wave Propagation Models in Mobile Ad Hoc Network by using Distance Scenario”, Romanian Journal of Information Technology and Automatic Control, Vol. 32, No. 2, 35-50, 2022.
  • P. Ghosh and D. Verma, "An Improved Reputation Based Approach for Malicious Node Detection System in Manet," 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), 2022, pp. 275-277, doi: 10.1109/ICACITE53722.2022.9823753.

Abstract Views: 53

PDF Views: 2




  • Co-Ordinated Blackhole and Grayhole Attack Detection Using Smart & Secure Ad Hoc On-Demand Distance Vector Routing Protocol in MANETs

Abstract Views: 53  |  PDF Views: 2

Authors

Sampada H. K.
Department of Electronics and Communication Engineering, Atria Institute of Technology, Bangalore, India
Shobha K. R.
Department of Electronics and Telecommunication Engineering, Ramaiah Institute of Technology, Bangalore, India

Abstract


Mobile Ad Hoc Network (MANET) devices are powered from battery and due to infrastructure-less feature, the security and energy consumption are major concerns. Most of the researchers have assumed that the Cluster Head (CH) nodes are benign and frequently undergo cluster re-election, which shortens the network lifetime. Smart & Secure Ad Hoc On-Demand Distance Vector algorithm (S2-AODV) is proposed with secondary CH (S-CH), primary CH (P-CH) and a super cluster head (SCH) node along with the other nodes. Modified-AODV (M-AODV) is used for neighbor discovery. Weight-based clustering algorithm is proposed, with the primary and a secondary CH node to enhance the network efficiency. S2-AODV enhances security using Honey-pot AODV (H-AODV) and avoids the CH re-election process enhancing the overall network lifetime. The proposed algorithm works in off-line mode and on-line mode. In off-line mode the various Wi-Fi parameters like Received Signal Strength Indicator (RSSI), transmission power, battery level, distance and number of transmissions retries are collected from each CH node in the network. A look-up table indicating the transmission power (TXP) to be set by the CH nodes is determined by machine learning (ML) algorithms. This table is circulated among every CH node by SCH node in the network. Due to this process the intermittent reelection of the P-CH and S-CH nodes can be avoided, enhancing the network lifetime. In on-line mode, SCH executes H-AODV to identify and remove the malicious CH (black hole / gray hole) nodes (ns-2.34).

Keywords


MANETs, AODV, M-AODV, H-AODV, Cluster, Black Hole Attack.

References





DOI: https://doi.org/10.22247/ijcna%2F2024%2F224433