Skip to main content
Log in

DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Mobile Ad-hoc Network (MANET) is an emerging and prevalent technology in wireless networks that consists of autonomous mobile nodes. These movable nodes can easily join and exit the network. Mobile nodes communicate with other nodes via intermediary nodes, eliminating the need for any fixed infrastructure. In this network, it is expected that intermediate nodes always assist in locating the destination node by rebroadcasting the request packet provided by the source node if the destination is not found in the routing table. However, in a real-world network, there may be some dishonest nodes that do not assist in identifying the best path for the destinations and instead deliver a fake route reply regarding the shortest path for destination nodes with the highest destination sequence number. The liar node's bogus route reply packet draws data traffic, resulting in packet loss in the network. This sort of malicious behavior on this network is sometimes referred to as a black-hole attack, which is an active attack that degrades network performance. A flooding attack is a form of denial-of-service attack that uses network bandwidth by flooding the flooder node with bogus packets. In a route request flooding attack, the flooder node uses a large number of false request packets to drain network resources. This work presents a Dynamic Threshold And Monitoring-based (DTAM) technique for protecting MANETs from black-hole and flooding attack. The NS-2 simulator is used to evaluate the performance of various protocols, and the findings reveal that the DTAM scheme outperforms the existing state-of-the-art schemes on various performance metrics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Algorithm 1
Algorithm 2
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Availability of Data and Materials

The authors confirm that the data supporting the findings of this study are available within the article.

References

  1. Eissa, T., Razak, S. A., Khokhar, R. H., & Samian, N. (2014). Erratum to: Trust-based routing mechanism in MANET: Design and Implementation. Mobile Networks and Applications. https://doi.org/10.1007/s11036-011-0328-0

    Article  Google Scholar 

  2. Aina, F., Yousef, S., & Osanaiye, O. (2019). RAACM: Resource allocation for admission control in MANET. International Journal Wireless Information Networks, 26, 243–256. https://doi.org/10.1007/s10776-019-00432-z

    Article  Google Scholar 

  3. Quy, V. K., Nam, V. H., & Linh, D. M. (2021). A survey of QoS-aware routing protocols for the MANET-WSN convergence scenarios in IoT networks. Wireless Personal Communication, 120, 49–62. https://doi.org/10.1007/s11277-021-08433-z

    Article  Google Scholar 

  4. Mahiddin, N. A., Sarkar, N. I., & Cusack, B. (2017). An internet access solution: MANET routing and a gateway selection approach for disaster scenarios. The Review of Socionetwork Strategies, 11, 47–64. https://doi.org/10.1007/s12626-017-0004-3

    Article  Google Scholar 

  5. Singh, M. (2024). Spatial correlation based MAC protocol for WSN. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-023-04738-y

  6. Shukla, M., Joshi, B. K., & Singh, U. (2021). Mitigate wormhole attack and blackhole attack using elliptic curve cryptography in MANET. Wireless Personal Communication, 121, 503–526. https://doi.org/10.1007/s11277-021-08647-1

    Article  Google Scholar 

  7. Rani, P., Kavita, & Verma, S. (2022). Mitigation of black hole attacks using firefly and artificial neural network. Neural Computing & Applications, 34, 15101–15111. https://doi.org/10.1007/s00521-022-06946-7.

  8. Mankotia, V., Sunkariya, R. K., & Gurung, S. (2023). Dual security based protocol against gray-hole attack in MANET. Adhoc & Sensor Wireless Networks, 56.

  9. Nandi, M., & Anusha, K. (2021). An optimized and hybrid energy aware routing model for effective detection of flooding attacks in a Manet environment. Wireless Personal Communication. https://doi.org/10.1007/s11277-021-09079-7

    Article  Google Scholar 

  10. Mohammadi, P., & Ghaffari, A. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communication, 106, 365–376. https://doi.org/10.1007/s11277-019-06166-8

    Article  Google Scholar 

  11. Yasin, A., & Abu, Z. M. (2018). Detecting and isolating black hole attacks in MANET using timer based baited technique. Wireless Communication and Mobile Computing. https://doi.org/10.1155/2018/9812135

    Article  Google Scholar 

  12. Gurung, S., & Chauhan, S. (2018). A dynamic threshold based approach for mitigating black-hole attack in MANET. Wireless Networks, 24, 2957–2971. https://doi.org/10.1007/s11276-017-1514-1

    Article  Google Scholar 

  13. Ndajah, P., Matine, A. O., & Hounkonnou, M. N. (2019). Black hole attack prevention in wireless peer-to-peer networks: A new strategy. International Journal of Wireless Information Networks, 26, 48–60. https://doi.org/10.1007/s10776-018-0418-z

    Article  Google Scholar 

  14. Khalladi, R., Rebbah, M., & Smail, O. (2021). A new efficient approach for detecting single and multiple black hole attacks. The Journal of Supercomputing, 77, 7718–7736. https://doi.org/10.1007/s11227-020-03596-1

    Article  Google Scholar 

  15. Mankotia, V., Sunkaria, R. K., & Gurung, S. (2023). DT-AODV: A dynamic threshold protocol against black-hole attack in MANET. Sādhanā, 48, 190. https://doi.org/10.1007/s12046-023-02227-8

    Article  Google Scholar 

  16. Sivanesh, S., & Sarma Dhulipala, V. R. (2022). Analytical termination of malicious nodes (ATOM): An intrusion detection system for detecting black hole attack in mobile ad hoc networks. Wireless Personal Communication, 124, 1511–1524. https://doi.org/10.1007/s11277-021-09418-8

    Article  Google Scholar 

  17. Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating route request flooding attack in MANET. Wireless Networks, 24, 2899–2914. https://doi.org/10.1007/s11276-017-1515-0

    Article  Google Scholar 

  18. Zant, M. A., & Yasin, A. (2019). Avoiding and isolating flooding attack by enhancing AODV MANET Protocol (AIF_AODV). Hindawi Security and Communication Networks.

  19. Singh, G., & Joshi, G. (2021). A novel statistical adhoc on-demand distance vector routing protocol technique is using for preventing the Mobile Adhoc Network from flooding attack. Turkish Journal of Computer and Mathematics Education, 12(6), 1753–1765. https://doi.org/10.17762/turcomat.v12i6.3779

    Article  Google Scholar 

  20. Luong, N. T., Nguyen, A. Q., & Hoang, D. (2022). FAPDRP: A flooding attacks prevention and detection routing protocol in vehicular ad hoc network using behavior history and nonlinear median filter transformation. Wireless Networks. https://doi.org/10.1007/s11276-022-03174-8

    Article  Google Scholar 

  21. Mankotia, V., Sunkaria, R. K., & Gurung, S. (2023). AFA: Anti-flooding attack scheme against flooding attack in MANET. Wireless Personal Communications, 130, 1161–1190. https://doi.org/10.1007/s11277-023-10325-3

    Article  Google Scholar 

  22. The network simulator-ns-2. http://www.isi.edu/nsnam/ns/.

Download references

Acknowledgements

Not applicable.

Funding

The authors confirm that for this research no funding was received.

Author information

Authors and Affiliations

Authors

Contributions

All authors have contributed equally in this paper. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Shashi Gurung.

Ethics declarations

Competing interests

The authors declare that they have no competing interests.

Ethics Approval and Consent to Participate

Not applicable.

Consent for Publication

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mankotia, V., Sunkaria, R.K. & Gurung, S. DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks. Wireless Pers Commun 134, 1469–1490 (2024). https://doi.org/10.1007/s11277-024-10956-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-024-10956-0

Keywords

Navigation