Skip to main content
Log in

A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Wireless shared medium, randomly moving nodes and multi-hop architecture make mobile ad hoc networks vulnerable to various network layer threats. Grayhole attack is such a prominent network layer threat, in which a malevolent node attempts to establish a bogus route passing through itself and performs packet forwarding misbehavior by dropping a subset of the received data packets in order to degrade the network performance. In this paper, we address this issue by proposing a heuristic approach, referred to as sequence number based bait detection scheme, which attempts to isolate malevolent nodes during route discovery process. The mechanism is incorporated with ad hoc on-demand distance vector routing protocol. Performance of the proposed scheme is compared with an existing scheme under three grayhole adversary models adopting distinct mode of operations. Simulation results under various network parameters depict that the proposed scheme improves network performance depending upon the mode of operations of the adversaries.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Taheri, M., & Bagheri, M. (2014). High secure routing protocol with authentication and confidentiality increased in wireless ad hoc networks. Arabian Journal for Science and Engineering, 39(2), 1135–1145.

    Article  Google Scholar 

  2. Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In IEEE INFOCOM (pp. 100–110). IEEE

  3. Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180.

    Article  Google Scholar 

  4. Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. Systems Journal, IEEE, 9(1), 65–75.

    Article  Google Scholar 

  5. Rahimi, M. R., Venkatasubramanian, N., Mehrotra, S., & Vasilakos, A. V. (2012). MAPCloud: Mobile applications on an elastic and scalable 2-tier cloud architecture. In 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing (pp. 83–90). IEEE Computer Society.

  6. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.

    Article  Google Scholar 

  7. Sanandaji, A., Jabbehdari, S., Balador, A., & Kanellopoulos, D. (2013). MAC layer misbehavior in MANETs. IETE Technical Review, 30(4), 324–335.

    Article  Google Scholar 

  8. Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. Wireless Communications, IEEE, 20(6), 91–98.

    Article  Google Scholar 

  9. Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H. M. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.

    Article  Google Scholar 

  10. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). A novel solution for grayhole attack in AODV based MANETs. In International Conference on Advances in Communication, Network and Computing (pp. 60–67). Berlin Heidelberg: Springer.

  11. Zafar, H., Zuhairi, M., Harle, D., & Andonovic, I. (2012). A survey of quality of service-aware routing approaches for mobile ad hoc networks. IETE Technical Review, 29(3), 222–227.

    Google Scholar 

  12. Yang, B., Yamamoto, R., & Tanaka, Y. (2014). Dempster–Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. In International Conference on Advanced Communication Technology (pp. 223–232). IEEE.

  13. Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.

    Article  Google Scholar 

  14. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.

    Article  Google Scholar 

  15. Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18(4), 1234–1247.

    Article  Google Scholar 

  16. Xiang, L., Luo, J., & Vasilakos, A. (2011). Compressed data aggregation for energy efficient wireless sensor networks. In 8th Annual IEEE Communications society conference on Sensor, mesh and ad hoc communications and networks (SECON) (pp. 46–54). IEEE.

  17. Jhaveri, R. H., Patel, A. D., & Dangarwala, K. J. (2012). Comprehensive study of various DoS attacks and defense approaches in MANETs. In International Conference on Emerging Trends in Science, Engineering and Technology (pp. 25–31). IEEE.

  18. Zhang, X., Zhou, F., Zhu, X., Sun, H., Perrig, A., Vasilakos, A. V., & Guan, H. (2014). DFL: Secure and practical fault localization for datacenter networks. IEEE/ACM Transactions on Networking, 22(4), 1218–1231.

    Article  Google Scholar 

  19. Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering, 40(2), 530–538.

    Article  Google Scholar 

  20. Shila, D. M., Cheng, Y., & Anjali, T. (2009). Channel-aware detection of gray hole attacks in wireless mesh networks. In Global Telecommunications Conference (pp. 1–6). IEEE.

  21. Sen, J., Chandra, M. G., Harihara, S. G., Reddy, H., & Balamuralidhar, P. (2007). A mechanism for detection of gray hole attack in mobile ad hoc networks. In 6th International Conference on Information, Communications & Signal Processing (pp. 1–5). IEEE.

  22. Mamatha, G. S., & Sharma, S. C. (2010). A robust approach to detect and prevent network layer attacks in MANETS. International Journal of Computer Science and Security, 4(3), 275–284.

    Google Scholar 

  23. Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.

    Article  Google Scholar 

  24. Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). Seccloud: Bridging secure storage and computation in cloud. In IEEE 30th International Conference on Distributed Computing Systems Workshops (pp. 52–61). IEEE.

  25. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.

    Article  Google Scholar 

  26. Zhang, Z., Wang, H., Vasilakos, A. V., & Fang, H. (2012). ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070–1078.

    Article  Google Scholar 

  27. Perkins, C., Belding-Royer, E., & Das, S. (2003). RFC 3561-ad hoc on-demand distance vector (AODV) routing. In Internet RFCs, pp. 1–38.

  28. Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.

    Article  Google Scholar 

  29. He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.

    Article  Google Scholar 

  30. Hiremani, V. A., & Jadhao, M. M. (2013). Eliminating co-operative blackhole and grayhole attacks using modified EDRI table in MANET. In International Conference on Green Computing, Communication and Conservation of Energy (pp. 944–948). IEEE.

  31. Bindra, G. S., Kapoor, A., Narang, A., & Agrawal, A. (2012). Detection and removal of co-operative blackhole and grayhole attacks in MANETs. In IEEE International Conference on System Engineering and Technology (pp. 1–5). IEEE.

  32. Zhou, L., Chao, H. C., & Vasilakos, A. V. (2011). Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358–1367.

    Article  Google Scholar 

  33. Khattak, H., Nizamuddin, N., Khurshid, F., & Amin, N. (2013). Preventing black and gray hole attacks in AODV using optimal path routing and hash. In 10th IEEE International Conference on Networking, Sensing and Control (pp. 645–648). IEEE.

  34. Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In Proceeding of International Conference on Advanced Computing & Communication Technologies (pp. 254–260). IEEE.

  35. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP Journal of Computer Science, 11(1), 1–12.

    Google Scholar 

  36. Jhaveri, R. H. (2013). Reliable approach to prevent blackhole and grayholes attacks in mobile ad hoc networks. In H. F. Rashvand & H. C. Chao (Eds.), Dynamic ad hoc networks (pp. 261–280). UK: IET.

    Google Scholar 

  37. Dhane, A., & Sharma, S. (2008). Modeling and analysis of sequence number attack and its detection in AODV. In 16th IEEE International Conference on Networks (pp. 1–6). IEEE.

  38. Patel, A. D., & Chawda, K. (2015). Dual security against grayhole attack in MANETs. In L. C. Jain, S. Patnaik, & N. Ichalkaranje (Eds.), Intelligent computing, communication and devices (pp. 33–37). India: Springer.

    Google Scholar 

  39. The network simulator-ns-2. (2015). http://www.isi.edu/nsnam/ns/

Download references

Acknowledgments

The authors would like to thank the management of SVM Institute of Technology, Bharuch, India and the management of CSPIT, Charotar University of Science & Technology, Changa, India for providing necessary assistance in carrying out the research work. Special thank goes to Prof. (Dr.) D.C. Jinwala, SVNIT, Surat, India and Prof. (Dr.) Robert J. van Glabbeek, NICTA, Sydney, Australia for their able guidance and motivation. We are also thankful to Prof. Ankit D. Patel, SVM Institute of Technology, Bharuch, India for providing valuable inputs during this research work. We would also like to thank the anonymous reviewers and the editors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rutvij H. Jhaveri.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jhaveri, R.H., Patel, N.M. A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Netw 21, 2781–2798 (2015). https://doi.org/10.1007/s11276-015-0945-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-0945-9

Keywords

Navigation