Multistage Security Detection in Mobile Ad-Hoc Network (MANET)

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2020 by IJETT Journal
Volume-68 Issue-11
Year of Publication : 2020
Authors : Muhannad Tahboush, Mary Agoyi, Abdllkader Esaid
DOI :  10.14445/22315381/IJETT-V68I11P213

Citation 

MLA Style: Muhannad Tahboush, Mary Agoyi, Abdllkader Esaid  "Multistage Security Detection in Mobile Ad-Hoc Network (MANET)" International Journal of Engineering Trends and Technology 68.11(2020):97-104. 

APA Style:Muhannad Tahboush, Mary Agoyi, Abdllkader Esaid. Multistage Security Detection in Mobile Ad-Hoc Network (MANET)  International Journal of Engineering Trends and Technology, 68(11),97-104.

Abstract
Mobile Ad-hoc Networks (MANET) is a self-organized, non-centralized network of mobile nodes that communicate directly through intermediate nodes without infrastructure. MANET is vulnerable to several types of attacks and security threats, such as wormhole attacks. A wormhole attack captures the packets from one location of the network and tunnels them to another location to mislead the legitimate path and disrupt the network. Many algorithms based on round trip time (RTT) have been developed to overcome the wormhole attack. RTT is a message used to measure the distance in time perspective from source to all its neighbors. RTT suffers from many limitations such as processing delay, inaccurate value, and does not indicate any attack. This study proposes a Multistage Security Detection (MSD) algorithm based on RTT, PDR, and transmission. The Multistage security detection algorithm prevents a malicious node from taking over the legitimate path in MANET. MSD algorithm was implemented using an NS-2 network simulator. The performance metrics considered to evaluate the proposed algorithms and analyzing performance are delay, throughput, packet delivery ratio (PDR), packet dropping ratio, and the number of packets received. The proposed approach employs a popular reactive Ad-hoc On-Demand Distance Vector (AODV) routing protocol to enhance the detection method. MSD managed to outperform the previous study. The proposed detection algorithm (MSD) outperformed wormhole detection than the proposed algorithms in the literature.

Reference

[1] S. Majumder and D. Bhattacharyya, Mitigating wormhole attack in MANET using absolute deviation statistical approach, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, (2018) 317-320.
[2] P. Sarkar, C. Kar, B. Sen, and K. Sharma, Sensitivity analysis on AODV with Wormhole attack, 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), Dehradun, (2016) 803-807.
[3] S. Amutha and K. Balasubramanian, Secured energy-optimized Ad hoc on-demand distance vector routing protocol, Computers and Electrical Engineering. 72 (2017).
[4] S. N. Ghormare, S. Sorte and S. S. Dorle, Detection and Prevention of Wormhole Attack in WiMAX Based Mobile Adhoc Network, 2018 Second International Conference on Electronics, Communication, and Aerospace Technology (ICECA), Coimbatore. (2018) 1097-1101.
[5] R. Singh, J. Singh, and R. Singh, WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks, 2016, Article ID 8354930. http://dx.doi.org/10.1155/2016/8354930.
[6] S. Eddie, B. Akbari, and P. Poshtiban, WANI: Wormhole avoidance using neighbor information, 7th Conference on Information and Knowledge Technology (IKT), Urmia, (2015) 1-6.
[7] S. Mukherjee, M. Chattopadhyay, S. Chattopadhyay, and P. Kar, Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network, (2016) Article ID 3405264.
[8] R. Verma, R. Sharma, and U. Singh, New approach through detection and prevention of wormhole attack in MANET, International conference of Electronics, Communication, and Aerospace Technology (ICECA), Coimbatore. (2017) 526-531
[9] J. Anju and C. N. Sminesh, An Improved Clustering-Based Approach for Wormhole Attack Detection in MANET, 3rd International Conference on Eco-friendly Computing and Communication Systems, Mangalore. (2014) 149-154.
[10] A. Louazani, L. Sekhri and B. Kechar, A time Petri net model for wormhole attack detection in wireless sensor networks, International Conference on Smart Communications in Network Technologies (SaCoNeT), Paris. (2013) 1-6.
[11] W. A. Aliady and S. A. Al-Ahmadi, Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks, in IEEE Access, 7 (2019) 84132-84141.
[12] H. As`adi, A. Keshavarz-Haddad, and A. Jamshidi, A New Statistical Method for Wormhole Attack Detection in MANETs, 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Tehran. (2018) 1-6.
[13] D. Sasirekha and N. Radha, Secure and attack aware routing in mobile ad hoc networks against wormhole and sinkhole attacks, 2nd International Conference on Communication and Electronics Systems (ICCES), Coimbatore. (2017) 505-510
[14] S. Khobragade and P. Padiya, Detection and prevention of Wormhole Attack Based on Delay Per-Hop Technique for Wireless Mobile Ad-hoc Network, International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi. (2016) 1332-1339.
[15] M. S. Ahsan, M. N. M. Bhutta and M. Maqsood, Wormhole attack detection in the routing protocol for low power lossy networks, International Conference on Information and Communication Technologies (ICICT), Karachi, (2017) 58-67.
[16] S. Majumder and D. Bhattacharyya, Mitigating wormhole attack in MANET using absolute deviation statistical approach, IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, (2018) 317-320.
[17] S. Qazi, R. Raad, Y. Mu, and Willy Susilo, Multirate DelPHI to secure multi-rate ad hoc networks against wormhole attacks, Journal of Information Security and Applications, (2018) 2214-2126.
[18] V. Teotia, S. K. Dhurandher, I. Woungang, and M. S. Obaidat, Wormhole prevention using COTA mechanism in position based environment over MANETs, IEEE International Conference on Communications (ICC), London, (2015) 7036-7040.
[19] P. Kaneria and A. Rajavat, Detecting and avoiding of wormhole attack on MANET using trusted AODV routing algorithm, Symposium on Colossal Data Analysis and Networking (CDAN), Indore. (2016) 1-5.
[20] A. M. El-Seminary and H. Diab, BP-AODV: Blackhole Protected AODV Routing Protocol for MANETs Based on Chaotic Map, in IEEE Access. 7(2019) 95197-95211.
[21] P. Amish, V.B.Vaghela, Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol. 7th International Conference on Communication, Computing and Virtualization (2016).
[22] S. Deshmukh, S. Sonavane, A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things, The 12th International Conference Interdisciplinary in Engineering. (2019).
[23] M. Johnson, A. Siddiqui, and A. Karami, Wormhole Attack Detection and Prevention Technique in Wireless Sensor Networks, International Journal of Computer Applications (0975 - 8887) 174 (4) (2017).
[24] X. Luo et al., CREDND: A Novel Secure Neighbor Discovery Algorithm for Wormhole Attack, in IEEE Access, 7 (2019) 18194-18205.
[25] L. Lu, M. Hussain, G. Luo, and Z. Han, Pworm: Passive and Real-Time Wormhole Detection Scheme for WSNs, (2015), Article ID 356382.
[26] H. Shrivastava, S. Singh, A Survey on Wormhole Attack Detection in Wireless Network, (IJCSIT) International Journal of Computer Science and Information Technologies, 7(3) (2016) 1273-1276.
[27] R. Mudgal and R. Gupta, Study of various wormhole attack detection techniques in mobile ad hoc network, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai. (2016) 3748-3754.
[28] M. A. Patel and M. M. Patel, Wormhole Attack Detection in Wireless Sensor Network, International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore (2018) 269-274.

Keywords
Wormhole attack. Malicious node. Legitimate node. AODV. MANET.