Use of Node credibility and Andrews plot to detect and prevent BHA in MANET

  • Ankita Kumari Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Jharkhand, India https://orcid.org/0000-0002-0338-915X
  • Sandip Dutta Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Jharkhand, India
  • Soubhik Chakraborty Department of Mathematics, Birla Institute of Technology, Mesra, Jharkhand, India
Keywords: Andrew's plot, Black Hole Attack, credit-based system, credibility, security, MANET

Abstract

The MANET wireless network operates independently of any infrastructure and can establish connections dynamically, making it highly accessible regardless of the environment. However, the network is vulnerable to attacks such as the BHA, which can cause the depletion of the network. This attack introduces MNs into the network, providing false routing information to the source node. This leads to the drop of data packets and ultimately damages the network. To address this issue, we propose a node credibility-based approach that utilizes Andrew's plot to assess node credibility after several transactions. This method enables us to identify highly credible nodes which can be considered trustworthy in the network. We utilized Network Simulator software to create various MANET scenarios and test the effectiveness of our proposed approach against the BHA.

References

Andrews, D.F. (1972). Plots of high-dimensional data. Biometrics, 28, 125-136. https://doi.org/10.2307/2528964

Cai, R. J., Li, X. J., & Chong, P. H. J. (2018). An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE transactions on Mobile Computing, 18(1), 42-55. https://doi.org/10.1109/TMC.2018.2828814

Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2014).Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal, 9(1), 65-75. https://doi.org/10.1109/JSYST.2013.2296197

El-Semary, A. M., &Diab, H. (2019). BP-AODV: Blackhole protected AODV routing protocol for MANETs based on chaotic map. IEEE Access, 7, 95197-95211. https://doi.org/10.1109/ACCESS.2019.2928804

Gaurav, A., & Singh, A. K. (2021). Light weight approach for secure backbone construction for MANETs. Journal of King Saud University-Computer and Information Sciences, 33(7), 908-919. https://doi.org/10.1016/j.jksuci.2018.05.013

Khalaf, O. I., Ajesh, F., Hamad, A. A., Nguyen, G. N., & Le, D. N. (2020). Efficient dual-cooperative bait detection scheme for collaborative attackers on mobile ad-hoc networks. IEEE Access, 8, 227962-227969. https://doi.org/10.1109/ACCESS.2020.3045004

Khamayseh, Y. M., Aljawarneh, S. A., &Asaad, A. E. (2018).Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency. Sustainable Computing: Informatics and Systems, 18, 90-100.

https://doi.org/10.1016/j.suscom.2017.07.001

Kumar, A., Varadarajan, V., Kumar, A., Dadheech, P., Choudhary, S. S., Kumar, V. A., &Veluvolu, K. C. (2021). Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocessors and Microsystems, 80, 103352. https://doi.org/10.1016/j.micpro.2020.103352

Li, T., Ma, J., Pei, Q., Song, H., Shen, Y., & Sun, C. (2019). DAPV: Diagnosing anomalies in MANETs routing with provenance and verification. IEEE Access, 7, 35302-35316. https://doi.org/10.1109/ACCESS.2019.2903150

Moudni, H., Er-rouidi, M., Mouncif, H., & El Hadadi, B. (2019).Black hole attack detection using fuzzy based intrusion detection systems in MANET. Procedia Computer Science, 151, 1176-1181. https://doi.org/10.1016/j.procs.2019.04.168

Nagalakshmi, T. J., Gnanasekar, A. K., Ramkumar, G., &Sabarivani, A. (2021). Machine learning models to detect the blackhole attack in wireless adhoc network. Materials Today: Proceedings, 47, 235-239. https://doi.org/10.1016/j.matpr.2021.04.129

Oakley, I. (2020). Solutions to Black Hole Attacks in MANETs. IEEE, In 2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 1-6. https://doi.org/10.1109/CSNDSP49049.2020.9249524

Pranav, P., Dutta, S., &Chakraborty, S. (2021).Empirical and statistical comparison of intermediate steps of AES-128 and RSA in terms of time consumption. Soft Computing, 25(21), 13127-13145. https://doi.org/10.1007/s00500-021-06085-6

Rajendran, N., Jawahar, P. K., &Priyadarshini, R. (2019). Cross centric intrusion detection system for secure routing over black hole attacks in MANETs. Computer Communications, 148, 129-135. https://doi.org/10.1016/j.comcom.2019.09.005

Rani, P., Verma, S., & Nguyen, G. N. (2020). Mitigation of black hole and grayhole attack using swarm inspired algorithm with artificial neural network. IEEE Access, 8, 121755-121764. https://doi.org/10.1109/ACCESS.2020.3004692

Saetang, W., &Charoenpanyasak, S. (2012).Caodv free blackhole attack in ad hoc networks. IACSIT Press., In International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT, 35, 63-67.

Shafi, S., Mounika, S., &Velliangiri, S. (2023). Machine Learning and Trust Based AODV Routing Protocol to Mitigate Flooding and Blackhole Attacks in MANET. Procedia Computer Science, 218, 2309-2318. https://doi.org/10.1016/j.procs.2023.01.206

Shah, I. A., &Kapoor, N. (2021).To Detect and Prevent Black Hole Attack in Mobile Ad Hoc Network. IEEE, In 2021 2nd Global Conference for Advancement in Technology (GCAT), pp. 1-4. https://doi.org/10.1109/GCAT52182.2021.9587471

Sharma, D. K., Dhurandher, S. K., Kumaram, S., Gupta, K. D., & Sharma, P. K. (2022). Mitigation of black hole attacks in 6LoWPAN RPL-based Wireless sensor network for cyber physical systems. Computer Communications, 189, 182-192. https://doi.org/10.1016/j.comcom.2022.04.003

Shukla, M., & Joshi, B. K. (2021).WITHDRAWN: A novel approach using elliptic curve cryptography to mitigate Two-Dimensional attacks in mobile Ad hoc networks.Materials Today: Proceedings, https://doi.org/10.1016/j.matpr.2020.12.886

Suma, S., &Harsoor, B. (2022).An approach to detect black hole attack for congestion control utilizing mobile nodes in wireless sensor network. Materials Today: Proceedings, 56, 2256-2260. https://doi.org/10.1016/j.matpr.2021.11.590

Syed, S. A. (2021). WITHDRAWN: A systematic comparison of mobile Ad-hoc network security attacks. Syed, S.A. (2021). A systematic comparison of mobile Ad-hoc network security attacks. Materials Today: Proceedings, https://doi.org/10.1016/j.matpr.2020.12.617

Yaseen, Q. M., &Aldwairi, M. (2018).An enhanced AODV protocol for avoiding black holes in MANET. Procedia Computer Science, 134, 371-376. https://doi.org/10.1016/j.procs.2018.07.196

Published
2023-04-30
How to Cite
Kumari, A., Dutta, S., & Chakraborty, S. (2023). Use of Node credibility and Andrews plot to detect and prevent BHA in MANET. International Journal of Experimental Research and Review, 30, 282-295. https://doi.org/10.52756/ijerr.2023.v30.026
Section
Articles