Abstract
Mobile Ad-hoc Network (MANET) is an emerging and prevalent technology in wireless networks that consists of autonomous mobile nodes. These movable nodes can easily join and exit the network. Mobile nodes communicate with other nodes via intermediary nodes, eliminating the need for any fixed infrastructure. In this network, it is expected that intermediate nodes always assist in locating the destination node by rebroadcasting the request packet provided by the source node if the destination is not found in the routing table. However, in a real-world network, there may be some dishonest nodes that do not assist in identifying the best path for the destinations and instead deliver a fake route reply regarding the shortest path for destination nodes with the highest destination sequence number. The liar node's bogus route reply packet draws data traffic, resulting in packet loss in the network. This sort of malicious behavior on this network is sometimes referred to as a black-hole attack, which is an active attack that degrades network performance. A flooding attack is a form of denial-of-service attack that uses network bandwidth by flooding the flooder node with bogus packets. In a route request flooding attack, the flooder node uses a large number of false request packets to drain network resources. This work presents a Dynamic Threshold And Monitoring-based (DTAM) technique for protecting MANETs from black-hole and flooding attack. The NS-2 simulator is used to evaluate the performance of various protocols, and the findings reveal that the DTAM scheme outperforms the existing state-of-the-art schemes on various performance metrics.
Similar content being viewed by others
Availability of Data and Materials
The authors confirm that the data supporting the findings of this study are available within the article.
References
Eissa, T., Razak, S. A., Khokhar, R. H., & Samian, N. (2014). Erratum to: Trust-based routing mechanism in MANET: Design and Implementation. Mobile Networks and Applications. https://doi.org/10.1007/s11036-011-0328-0
Aina, F., Yousef, S., & Osanaiye, O. (2019). RAACM: Resource allocation for admission control in MANET. International Journal Wireless Information Networks, 26, 243–256. https://doi.org/10.1007/s10776-019-00432-z
Quy, V. K., Nam, V. H., & Linh, D. M. (2021). A survey of QoS-aware routing protocols for the MANET-WSN convergence scenarios in IoT networks. Wireless Personal Communication, 120, 49–62. https://doi.org/10.1007/s11277-021-08433-z
Mahiddin, N. A., Sarkar, N. I., & Cusack, B. (2017). An internet access solution: MANET routing and a gateway selection approach for disaster scenarios. The Review of Socionetwork Strategies, 11, 47–64. https://doi.org/10.1007/s12626-017-0004-3
Singh, M. (2024). Spatial correlation based MAC protocol for WSN. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-023-04738-y
Shukla, M., Joshi, B. K., & Singh, U. (2021). Mitigate wormhole attack and blackhole attack using elliptic curve cryptography in MANET. Wireless Personal Communication, 121, 503–526. https://doi.org/10.1007/s11277-021-08647-1
Rani, P., Kavita, & Verma, S. (2022). Mitigation of black hole attacks using firefly and artificial neural network. Neural Computing & Applications, 34, 15101–15111. https://doi.org/10.1007/s00521-022-06946-7.
Mankotia, V., Sunkariya, R. K., & Gurung, S. (2023). Dual security based protocol against gray-hole attack in MANET. Adhoc & Sensor Wireless Networks, 56.
Nandi, M., & Anusha, K. (2021). An optimized and hybrid energy aware routing model for effective detection of flooding attacks in a Manet environment. Wireless Personal Communication. https://doi.org/10.1007/s11277-021-09079-7
Mohammadi, P., & Ghaffari, A. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communication, 106, 365–376. https://doi.org/10.1007/s11277-019-06166-8
Yasin, A., & Abu, Z. M. (2018). Detecting and isolating black hole attacks in MANET using timer based baited technique. Wireless Communication and Mobile Computing. https://doi.org/10.1155/2018/9812135
Gurung, S., & Chauhan, S. (2018). A dynamic threshold based approach for mitigating black-hole attack in MANET. Wireless Networks, 24, 2957–2971. https://doi.org/10.1007/s11276-017-1514-1
Ndajah, P., Matine, A. O., & Hounkonnou, M. N. (2019). Black hole attack prevention in wireless peer-to-peer networks: A new strategy. International Journal of Wireless Information Networks, 26, 48–60. https://doi.org/10.1007/s10776-018-0418-z
Khalladi, R., Rebbah, M., & Smail, O. (2021). A new efficient approach for detecting single and multiple black hole attacks. The Journal of Supercomputing, 77, 7718–7736. https://doi.org/10.1007/s11227-020-03596-1
Mankotia, V., Sunkaria, R. K., & Gurung, S. (2023). DT-AODV: A dynamic threshold protocol against black-hole attack in MANET. Sādhanā, 48, 190. https://doi.org/10.1007/s12046-023-02227-8
Sivanesh, S., & Sarma Dhulipala, V. R. (2022). Analytical termination of malicious nodes (ATOM): An intrusion detection system for detecting black hole attack in mobile ad hoc networks. Wireless Personal Communication, 124, 1511–1524. https://doi.org/10.1007/s11277-021-09418-8
Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating route request flooding attack in MANET. Wireless Networks, 24, 2899–2914. https://doi.org/10.1007/s11276-017-1515-0
Zant, M. A., & Yasin, A. (2019). Avoiding and isolating flooding attack by enhancing AODV MANET Protocol (AIF_AODV). Hindawi Security and Communication Networks.
Singh, G., & Joshi, G. (2021). A novel statistical adhoc on-demand distance vector routing protocol technique is using for preventing the Mobile Adhoc Network from flooding attack. Turkish Journal of Computer and Mathematics Education, 12(6), 1753–1765. https://doi.org/10.17762/turcomat.v12i6.3779
Luong, N. T., Nguyen, A. Q., & Hoang, D. (2022). FAPDRP: A flooding attacks prevention and detection routing protocol in vehicular ad hoc network using behavior history and nonlinear median filter transformation. Wireless Networks. https://doi.org/10.1007/s11276-022-03174-8
Mankotia, V., Sunkaria, R. K., & Gurung, S. (2023). AFA: Anti-flooding attack scheme against flooding attack in MANET. Wireless Personal Communications, 130, 1161–1190. https://doi.org/10.1007/s11277-023-10325-3
The network simulator-ns-2. http://www.isi.edu/nsnam/ns/.
Acknowledgements
Not applicable.
Funding
The authors confirm that for this research no funding was received.
Author information
Authors and Affiliations
Contributions
All authors have contributed equally in this paper. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Ethics Approval and Consent to Participate
Not applicable.
Consent for Publication
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Mankotia, V., Sunkaria, R.K. & Gurung, S. DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks. Wireless Pers Commun 134, 1469–1490 (2024). https://doi.org/10.1007/s11277-024-10956-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-024-10956-0