Use of Node credibility and Andrews plot to detect and prevent BHA in MANET
DOI:
https://doi.org/10.52756/ijerr.2023.v30.026Keywords:
Andrew's plot, Black Hole Attack, credit-based system, credibility, security, MANETAbstract
The MANET wireless network operates independently of any infrastructure and can establish connections dynamically, making it highly accessible regardless of the environment. However, the network is vulnerable to attacks such as the BHA, which can cause the depletion of the network. This attack introduces MNs into the network, providing false routing information to the source node. This leads to the drop of data packets and ultimately damages the network. To address this issue, we propose a node credibility-based approach that utilizes Andrew's plot to assess node credibility after several transactions. This method enables us to identify highly credible nodes which can be considered trustworthy in the network. We utilized Network Simulator software to create various MANET scenarios and test the effectiveness of our proposed approach against the BHA.
References
Andrews, D.F. (1972). Plots of high-dimensional data. Biometrics, 28, 125-136. https://doi.org/10.2307/2528964
Cai, R. J., Li, X. J., & Chong, P. H. J. (2018). An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE transactions on Mobile Computing, 18(1), 42-55. https://doi.org/10.1109/TMC.2018.2828814
Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2014).Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal, 9(1), 65-75. https://doi.org/10.1109/JSYST.2013.2296197
El-Semary, A. M., &Diab, H. (2019). BP-AODV: Blackhole protected AODV routing protocol for MANETs based on chaotic map. IEEE Access, 7, 95197-95211. https://doi.org/10.1109/ACCESS.2019.2928804
Gaurav, A., & Singh, A. K. (2021). Light weight approach for secure backbone construction for MANETs. Journal of King Saud University-Computer and Information Sciences, 33(7), 908-919. https://doi.org/10.1016/j.jksuci.2018.05.013
Khalaf, O. I., Ajesh, F., Hamad, A. A., Nguyen, G. N., & Le, D. N. (2020). Efficient dual-cooperative bait detection scheme for collaborative attackers on mobile ad-hoc networks. IEEE Access, 8, 227962-227969. https://doi.org/10.1109/ACCESS.2020.3045004
Khamayseh, Y. M., Aljawarneh, S. A., &Asaad, A. E. (2018).Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency. Sustainable Computing: Informatics and Systems, 18, 90-100.
https://doi.org/10.1016/j.suscom.2017.07.001
Kumar, A., Varadarajan, V., Kumar, A., Dadheech, P., Choudhary, S. S., Kumar, V. A., &Veluvolu, K. C. (2021). Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocessors and Microsystems, 80, 103352. https://doi.org/10.1016/j.micpro.2020.103352
Li, T., Ma, J., Pei, Q., Song, H., Shen, Y., & Sun, C. (2019). DAPV: Diagnosing anomalies in MANETs routing with provenance and verification. IEEE Access, 7, 35302-35316. https://doi.org/10.1109/ACCESS.2019.2903150
Moudni, H., Er-rouidi, M., Mouncif, H., & El Hadadi, B. (2019).Black hole attack detection using fuzzy based intrusion detection systems in MANET. Procedia Computer Science, 151, 1176-1181. https://doi.org/10.1016/j.procs.2019.04.168
Nagalakshmi, T. J., Gnanasekar, A. K., Ramkumar, G., &Sabarivani, A. (2021). Machine learning models to detect the blackhole attack in wireless adhoc network. Materials Today: Proceedings, 47, 235-239. https://doi.org/10.1016/j.matpr.2021.04.129
Oakley, I. (2020). Solutions to Black Hole Attacks in MANETs. IEEE, In 2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 1-6. https://doi.org/10.1109/CSNDSP49049.2020.9249524
Pranav, P., Dutta, S., &Chakraborty, S. (2021).Empirical and statistical comparison of intermediate steps of AES-128 and RSA in terms of time consumption. Soft Computing, 25(21), 13127-13145. https://doi.org/10.1007/s00500-021-06085-6
Rajendran, N., Jawahar, P. K., &Priyadarshini, R. (2019). Cross centric intrusion detection system for secure routing over black hole attacks in MANETs. Computer Communications, 148, 129-135. https://doi.org/10.1016/j.comcom.2019.09.005
Rani, P., Verma, S., & Nguyen, G. N. (2020). Mitigation of black hole and grayhole attack using swarm inspired algorithm with artificial neural network. IEEE Access, 8, 121755-121764. https://doi.org/10.1109/ACCESS.2020.3004692
Saetang, W., &Charoenpanyasak, S. (2012).Caodv free blackhole attack in ad hoc networks. IACSIT Press., In International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT, 35, 63-67.
Shafi, S., Mounika, S., &Velliangiri, S. (2023). Machine Learning and Trust Based AODV Routing Protocol to Mitigate Flooding and Blackhole Attacks in MANET. Procedia Computer Science, 218, 2309-2318. https://doi.org/10.1016/j.procs.2023.01.206
Shah, I. A., &Kapoor, N. (2021).To Detect and Prevent Black Hole Attack in Mobile Ad Hoc Network. IEEE, In 2021 2nd Global Conference for Advancement in Technology (GCAT), pp. 1-4. https://doi.org/10.1109/GCAT52182.2021.9587471
Sharma, D. K., Dhurandher, S. K., Kumaram, S., Gupta, K. D., & Sharma, P. K. (2022). Mitigation of black hole attacks in 6LoWPAN RPL-based Wireless sensor network for cyber physical systems. Computer Communications, 189, 182-192. https://doi.org/10.1016/j.comcom.2022.04.003
Shukla, M., & Joshi, B. K. (2021).WITHDRAWN: A novel approach using elliptic curve cryptography to mitigate Two-Dimensional attacks in mobile Ad hoc networks.Materials Today: Proceedings, https://doi.org/10.1016/j.matpr.2020.12.886
Suma, S., &Harsoor, B. (2022).An approach to detect black hole attack for congestion control utilizing mobile nodes in wireless sensor network. Materials Today: Proceedings, 56, 2256-2260. https://doi.org/10.1016/j.matpr.2021.11.590
Syed, S. A. (2021). WITHDRAWN: A systematic comparison of mobile Ad-hoc network security attacks. Syed, S.A. (2021). A systematic comparison of mobile Ad-hoc network security attacks. Materials Today: Proceedings, https://doi.org/10.1016/j.matpr.2020.12.617
Yaseen, Q. M., &Aldwairi, M. (2018).An enhanced AODV protocol for avoiding black holes in MANET. Procedia Computer Science, 134, 371-376. https://doi.org/10.1016/j.procs.2018.07.196