A comparative study of different security issues in MANET

  • Ankita Kumari Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Jharkhand, India https://orcid.org/0000-0002-0338-915X
  • Sandip Dutta Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Jharkhand, India https://orcid.org/0000-0002-3932-3048
  • Soubhik Chakraborty Department of Mathematics, Birla Institute of Technology, Mesra, Jharkhand, India
Keywords: Black hole attack, Sink hole attack, Worm hole attack, Malicious, RREP

Abstract

In a MANET (Mobile Ad-Hoc Network), an intruder can attempt to gain unlawful access to the network to obtain sensitive information. These attacks can occur at various network layers, and different attacks can be carried out. To mitigate the risks of such attacks, several solutions have been proposed. It can be characterized by dynamic topology, meaning that the network is formed by a group of nodes communicating wirelessly and without centralized control. This feature makes MANETs highly vulnerable to attacks, especially when malicious nodes are introduced into the network. These malicious nodes can engage in malicious activity that severely damages the network's performance and credibility. Among the major attacks that can be carried out in a MANET are Sinkhole attacks, Black hole attacks, and Wormhole attacks. Sinkhole attack, a malicious node intercepts a data packet, alters its contents, and then forwards it to its neighbors. This can cause other nodes to send their data packet to the malicious nodes, compromising the safety and privacy of the network. In a BHA, malicious nodes drop the data packet it receives, preventing them from accomplishing their intended destinations. This can result in a DoS attack, where legitimate users cannot access the network. A WHA involves two malicious nodes colluding to drop data packets from the network. They create a virtual tunnel between them, and any data that passes through this tunnel is dropped, making it impossible for legitimate nodes to communicate with each other. All these attacks can cause significant damage to the network, and researchers have proposed various solutions to protect the network from them. These solutions include using IDS, deploying secure routing protocols, and developing secure algorithms for data transmission. By implementing these solutions, it is possible to improve the Safety and trustworthiness of the MANET and prevent malicious nodes from causing harm to the network.

References

Alghamdi, R., & Bellaiche, M. (2023). A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks. Computers & Security, 125, 103014.

Babaeer, H.A., & Al-Ahmadi, S.A. (2020). Efficient and secure data transmission and sinkhole detection in a multi-clustering wireless sensor network based on homomorphic encryption and watermarking. IEEE Access, 8, 92098-92109. https://doi.org/10.1109/ACCESS.2020.2994587

Bai, S., Liu, Y., Li, Z. & Bai, X. (2019). Detecting wormhole attacks in 3D wireless ad hoc networks via 3D forbidden substructures. Computer Networks, 150, 190-200. https://doi.org/10.1016/j.comnet.2019.01.008

Chang, J.M., Tsou, P.C., Woungang, I., Chao, H.C., & Lai, C.F. (2014). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal, 9(1), 65-75. https://doi.org/10.1109/JSYST.2013.2296197

Chavan, A.A., Kurule, D.S., & Dere, P.U. (2016). Performance analysis of AODV and DSDV routing protocol in MANET and modifications in AODV against black hole attack. Procedia Computer Science, 79, 835-844. https://doi.org/10.1016/j.procs.2016.03.108

Dhaka, A., Nandal, A., & Dhaka, R.S. (2015). Gray and black hole attack identification using control packets in MANETs. Procedia Computer Science, 54, 83-91. https://doi.org/10.1016/j.procs.2015.06.010

Eltahlawy, A. M., Aslan, H. K., Abdallah, E. G., Elsayed, M. S., Jurcut, A. D., & Azer, M. A. (2023). A Survey on Parameters Affecting MANET Performance. Electronics, 12(9), 1956. https://doi.org/10.3390/electronics12091956

Gaurav, A., & Singh, A.K. (2021). Lightweight approach for secure backbone construction for MANETs. Journal of King Saud University-Computer and Information Sciences, 33(7), 908-919. https:// doi.org/10.1016/j.jksuci.2018.05.013

Gopinath, S., Vinoth Kumar, K., & Jaya Sankar, T. (2019). Secure location aware routing protocol with authentication for data integrity. Cluster Computing, 22(Suppl 6), 13609-13618.

Gothawal, D.B., & Nagaraj, S.V. (2019). Intrusion detection for enhancing RPL security. Procedia Computer Science, 165, 565-572. https://doi.org/10.1016/j.procs.2020.01.051

Govindasamy, J., & Punniakody, S. (2018). A comparative study of reactive, proactive, and hybrid routing protocol in wireless sensor networks under wormhole attack. Journal of Electrical Systems and Information Technology, 5(3), 735-744. https://doi.org/10.1016/j.jesit.2017.02.002

Hamedheidari, S., & Rafeh, R. (2013). A novel agent-based approach to detect sinkhole attacks in wireless sensor networks. Computers & Security, 37, 1-14. https://doi.org/10.1016/j.cose.2013.04.002

Hammamouche, A., Omar, M., Djebari, N., & Tari, A. (2018). Lightweight reputation-based approach against simple and cooperative blackhole attacks for MANET. Journal of Information Security and Applications, 43, 12-20. https://doi.org/10.1016/j.jisa.2018.10.004

Hua, J., Zhou, Z., & Zhong, S. (2020). Flow misleading: Wormhole attack in software-defined networking via building in-band covert channel. IEEE Transactions on Information Forensics and Security, 16, 1029-1043. https://doi.org/10.1109/TIFS.2020.3013093

Jahandoust, G., & Ghassemi, F. (2017). An adaptive sinkhole aware algorithm in wireless sensor networks. Ad Hoc Networks, 59, 24-34. https://doi.org/10.1016/j.adhoc.2017.01.002

Jamali, S., &Fotohi, R. (2017). DAWA: Defending against wormhole attacks in MANETs using fuzzy logic and an artificial immune system. The Journal of Supercomputing, 73(12), 5173-5196. https://doi.org/10.1007/s11227-017-2075-x

Joardar, S., Sinhababu, N., Dey, S., & Choudhury, P. (2023). Mitigating DoS attack in MANETs considering node reputation with AI. Journal of Network and Systems Management, 31(3), 1-34.

Khamayseh, Y.M., Aljawarneh, S.A., & Asaad, A.E. (2018). Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency. Sustainable Computing: Informatics and Systems, 18, 90-100. https://doi.org/10.1016/j.suscom.2017.07.001

Khatoon, N., Pranav, P., & Roy, S. (2021). FQ-MEC: Fuzzy-Based Q-Learning Approach for Mobility-Aware Energy-Efficient Clustering in MANET. Wireless Communications and Mobile Computing, 2021, 1-12. https://doi.org/10.1155/2021/8874632

Kim, G., Han, Y., & Kim, S. (2010). A cooperative-sinkhole detection method for mobile ad hoc networks. AEU-International Journal of Electronics and Communications, 64(5), 390-397. https://doi.org/10.1016/j.aeue.2009.01.008

Krishnakumar, V., & Asokan, R. (2023). An energy efficient and QoS routing protocol for MANET realised over multi‐objective red deer algorithm (RD‐MOCER) in support of emergency disaster management. International Journal of Communication Systems, 36(1), e5349.

Kumar, K.A. (2016). Worm hole-black hole attack detection and avoidance in Manet with random PTT using FPGA. IEEE, In 2016 International Conference on Communication Systems and Networks (ComNet), pp. 93-98. https://doi.org/10.1109/CSN.2016.7823993

Kumari, A., Dutta, S., & Chakraborty, S. (2023). Use of Node credibility and Andrews plot to detect and prevent BHA in MANET. International Journal of Experimental Research and Review,30, 282-295. https://doi.org/10.52756/ijerr.2023.v30.026

Li, Z., Pu, D., Wang, W., & Wyglinski, A. (2011). Forced collision: Detecting wormhole attacks with physical layer network coding. Tsinghua Science and Technology, 16(5), 505-519. https://doi.org/10.1016/S1007-0214(11)70069-4

Liu, Y., Ma, M., Liu, X., Xiong, N.N., Liu, A., & Zhu, Y. (2018). Design and analysis of probing route to defense sinkhole attacks for Internet of Things security. IEEE Transactions on Network Science and Engineering, 7(1), 356-372. https://doi.org/10.1109/TNSE.2018.2881152

Nagalakshmi, T.J., Gnanasekar, A.K., Ramkumar, G., & Sabarivani, A. (2021). Machine learning models to detect the blackhole attack in wireless ad-hoc networks. Materials Today: Proceedings, 47, 235-239. https://doi.org/10.1016/j.matpr.2021.04.129

Ngai, E.C., Liu, J., & Lyu, M.R. (2007). An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Computer Communications, 30(11-12), 2353-2364. https://doi.org/10.1016/j.comcom.2007.04.025

Nguyen, H. L., & Nguyen, U. T. (2008). A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks, 6(1), 32-46. https://doi.org/10.1016/j.adhoc.2006.07.005

Nguyen, H. L., & Nguyen, U. T. (2012). A study of different types of attacks in mobile ad hoc networks. In 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1-6. https://doi.org/10.1109/CCECE.2012.6335025

Pullagura, J. R., & Dhulipalla, V. R. (2023). Black‐hole attack and counter measure in ad hoc networks using traditional routing optimization. Concurrency and Computation: Practice and Experience, 35(9), e7643.

Qazi, S., Raad, R., Mu, Y., & Susilo, W. (2018). Multirate DelPHI to secure multi-rate ad hoc networks against wormhole attacks. Journal of Information Security and Applications, 39, 31-40. https://doi.org/10.1016/j.jisa.2018.01.005

Rani, P., Verma, S., & Nguyen, G.N. (2020). Mitigation of black hole and gray hole attack using swarm-inspired algorithm with the artificial neural network. IEEE Access, 8, 121755-121764.

https://doi.org/10.1109/ACCESS.2020.3004692

Ranjan, R., Singh, N.K., & Singh, A. (2015). Security issues of black hole attacks in MANET. IEEE, In International Conference on Computing, Communication & Automation, pp. 452-457. https://doi.org/10.1109/CCAA.2015.7148419

Reddy, B., & Dhananjaya, B. (2022). The AODV routing protocol with built-in Security to counter blackhole attacks in MANET. Materials Today: Proceedings, 50, 1152-1158. https://doi.org/10.1016/j.matpr.2021.08.039

Sanchez-Casado, L., Macia-Fernandez, G., Garcia-Teodoro, P., & Aschenbruck, N. (2015). Identification of contamination zones for sinkhole detection in MANETs. Journal of Network and Computer Applications, 54, 62-77. https://doi.org/10.1016/j.jnca.2015.04.008

Sangaiah, A. K., Javadpour, A., Ja’fari, F., Pinto, P., Ahmadi, H., & Zhang, W. (2022). CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities. Microprocessors and Microsystems, 90, 104504.

Sankar, S. M., Dhinakaran, D., Deboral, C. C., & Ramakrishnan, M. (2023). Safe Routing Approach by Identifying and Subsequently Eliminating the Attacks in MANET. arXiv preprint arXiv, 2304.10838.

Shafiei, H., Khonsari, A., Derakhshi, H., & Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3), 644-653. https://doi.org/10.1016/j.jcss.2013.06.016

Sharma, V., Singh, H., Kaur, M., & Banga, V. (2013). Performance evaluation of reactive routing protocols in MANET networks using GSM based voice traffic applications. Optik, 124(15).

Shim, W., Kim, G., & Kim, S. (2010). A distributed sinkhole detection method using cluster analysis. Expert Systems with Applications, 37(12), 8486-8491. https://doi.org/10.1016/j.eswa.2010.05.028

Shukla, M., Joshi, B. K., & Singh, U. (2021). Mitigate wormhole attack and blackhole attack using elliptic curve cryptography in MANET. Wireless Personal Communications, 121, 503-526.

Simpson, S.V., & Nagarajan, G. (2021). A fuzzy-based Cooperative Blackmailing Attack detection scheme for Edge Computing nodes in a MANET-IOT environment. Future Generation Computer Systems, 125, 544-563. https://doi.org/10.1016/j.future.2021.06.052

Singh, U., Samvatsar, M., Sharma, A., & Jain, A.K. (2016). Detection and avoidance of unified attacks on MANET using trusted secure AODV routing protocol. In 2016 Symposium on Colossal Data Analysis and Networking (CDAN), pp. 1-6. https://doi.org/10.1109/CDAN.2016.7570908

Sreelaja, N.K., & Pai, G.V. (2014). Swarm intelligence-based approach for sinkhole attack detection in wireless sensor networks. Applied Soft Computing, 19, 68-79. https://doi.org/10.1016/j.asoc.2014.01.015

Suma, S., & Harsoor, B. (2022). An approach to detect black hole attack for congestion control utilizing mobile nodes in wireless sensor network. Materials Today: Proceedings, 56, 2256-2260.

Tahboush, M., & Agoyi, M. (2021). A hybrid wormhole attack detection in mobile ad-hoc network (MANET). IEEE Access, 9, 11872-11883.

Tamilselvan, L., & Sankaranarayanan, V. (2007). August. Prevention of blackhole attack in MANET. The 2nd International Conference on Wireless Broadband and Ultra-wideband Communications (AusWireless 2007), pp. 21-21. https://doi.org/10.1109/AUSWIRELESS.2007.61

Tiruvakadu, D.S.K., & Pallapa, V. (2018). Confirmation of wormhole attack in MANETs using honeypot. Computers & Security, 76, 32-49. https://doi.org/10.1016/j.cose.2018.02.004

Tseng, H.C., & Culpepper, B.J. (2005). Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators. Computers & Security, 24(7), 561-570. https://doi.org/10.1016/j.cose.2005.07.001

Vigenesh, M., & Santhosh, R. (2019). An efficient stream region sink position analysis model for routing attack detection in mobile ad hoc networks. Computers & Electrical Engineering, 74, 273-280. https://doi.org/10.1016/j.compeleceng.2019.02.005

Zhang, F.J., Zhai, L.D., Yang, J.C., & Cui, X. (2014). Sinkhole attack detection based on redundancy mechanism in wireless sensor networks. Procedia Computer Science, 31, 711-720. https://doi.org/10.1016/j.procs.2014.05.319

Published
2023-07-30
How to Cite
Kumari, A., Dutta, S., & Chakraborty, S. (2023). A comparative study of different security issues in MANET. International Journal of Experimental Research and Review, 31(Spl Volume), 168-185. https://doi.org/10.52756/10.52756/ijerr.2023.v31spl.016