Advertisement

Neural Computing and Applications

, Volume 31, Supplement 1, pp 15–22 | Cite as

An efficient technique for mitigating stealthy attacks using MNDA in MANET

  • D. MuruganandamEmail author
  • J. Martin Leo Manickam
S.I. : Machine Learning Applications for Self-Organized Wireless Networks
  • 44 Downloads

Abstract

In mobile ad hoc networks, stealthy packet dropping is considered as a suite comprising four attacks, namely misrouting, control attacks, character designation and the conniving impact, that can be effectively propelled against mobile specially appointed systems. Stealthy packet dropping upsets the packets through malevolent conduct at a transitional node. This paper presents a novel stealthy assault location strategy for distinguishing packet misrouting in the constructed mobile ad hoc networks. Moreover, we propose a new algorithm called dynamic malicious node detection algorithm for identifying the stealthy attack nodes in mobile network environment. This is achieved in two stages. The first stage gathers additional information pertaining to the middle nodes and stores in a special table in the intermediate nodes. The second stage identifies the misbehaving nodes if any in a specified path. Finally, an alternate path is chosen to send the packets to fulfill the communication. Various performance criteria are evaluated for this work. The results of these analysis show that our proposed work is more efficient than the Bayesian linear model-based detection.

Keywords

Mobile ad hoc networks Stealthy attack Malicious node Delay 

Notes

Compliance with ethical standards

Conflict of interest

The authors declared that they have no conflict of interest.

References

  1. 1.
    D’Apice C, Manzo R (2006) Calculation of predicted average packet delay and its application for flow control in data network. J Inf Optim Sci 27(2):411–423zbMATHGoogle Scholar
  2. 2.
    Singh JP, Dutta P, Chakrabarti A (2014) Weighted delay prediction in mobile ad hoc network using fuzzy time series. Egypt Inform J 15:105–114CrossRefGoogle Scholar
  3. 3.
    Zafar S, Tariq H, Manzoor K (2016) Throughput and delay analysis of AODV, DSDV and DSR routing protocols in mobile ad hoc networks. Int J Comput Netw Appl 3(2):25–31Google Scholar
  4. 4.
    Elhoseny M, Tharwat A, Yuan X, Hassanien AE (2018) Optimizing K-coverage of mobile WSNs. Expert Syst Appl 92:142–153CrossRefGoogle Scholar
  5. 5.
    Elsayed W, Elhoseny M, Sabbeh S, Riad A (2017) Self-maintenance model for wireless sensor networks. Comput Electr Eng.  https://doi.org/10.1016/j.compeleceng.2017.12.022 Google Scholar
  6. 6.
    Khalil I, Bagchi S (2011) Stealthy attacks in wireless ad hoc networks: detection and countermeasure. IEEE Trans Mob Comput 10(8):1096–1112CrossRefGoogle Scholar
  7. 7.
    Beshr FB, Ishaq AB, Aljabri S, Sheltami TR (2016) A guard node (GN) based technique against misbehaving nodes in MANET. J Ubiquitous Syst Pervasive Netw 7(1):13–17Google Scholar
  8. 8.
    Khalil I (2008) MIMI: mitigating packet misrouting in locally-monitored multi-hop wireless ad hoc networks. In: IEEE GLOBECOM 2008—2008 IEEE global telecommunications conference, New Orleans, LO, pp 1–5Google Scholar
  9. 9.
    Stoleru R, Wu H, Chenji H (2011) Secure neighbor discovery in mobile ad hoc networks. In: 2011 IEEE eighth international conference on mobile ad-hoc and sensor systems, Valencia, pp 35–42Google Scholar
  10. 10.
    Čapkun S, Hamdi M, Hubaux JP (2001) GPS-free positioning in mobile ad-hoc networks. In: Proceedings of the 34th annual Hawaii international conference on system sciences, Maui, HI, USA, p 10Google Scholar
  11. 11.
    Manickam JML, Muruganandam D (2015) A survey on attacks in wireless networks. Aust J Basic Appl Sci 9(21):72–78Google Scholar
  12. 12.
    Tuli H, Kumar S (2014) A review on delay prediction techniques in MANET. Int J Comput Appl 108(14):12–14Google Scholar
  13. 13.
    Aoki M, Oki E, Rojas-Cessa R (2010) Scheme to measure one-way delay variation with detection and removal of clock skew. In: 2010 International conference on high performance switching and routing, Richardson, TX, pp 159–164Google Scholar
  14. 14.
    Saini R, Khari M (2011) Defining malicious behavior of a node and its defensive techniques in ad hoc networks. Int J Smart Sens Ad Hoc Netw 1(1):17–20Google Scholar
  15. 15.
    Oo MZ, Othman M, O’Farrell T (2016) A proxy acknowledgement mechanism for TCP variants in mobile ad hoc networks. J Commun Netw 18(2):238–245CrossRefGoogle Scholar
  16. 16.
    Balakrishnan K, Deng J, Varshney VK (2005) TWOACK: preventing selfishness in mobile ad hoc networks. IEEE Wirel Commun Netw Confrence 4:2137–2142Google Scholar
  17. 17.
    Ojetunde B, Shibata N, Gao J (2017) Secure payment system utilizing MANET for disaster areas. IEEE Trans Syst Man Cybern Syst 99:1–13CrossRefGoogle Scholar
  18. 18.
    Khan MS, Midi D, Khan MI, Bertino E (2017) Fine-grained analysis of packet loss in MANETs. IEEE Access 5:7798–7807CrossRefGoogle Scholar
  19. 19.
    Tsuda T, Komai Y, Hara T, Nishio S (2016) Top-k query processing and malicious node identification based on node grouping in MANETs. IEEE Access 4:993–1007CrossRefGoogle Scholar
  20. 20.
    Chang JM, Tsou PC, Woungang I, Chao HC, Lai CF (2015) Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach. IEEE Syst J 9(1):65–75CrossRefGoogle Scholar
  21. 21.
    Surendran S, Prakash S (2015) An ACO look-ahead approach to QOS enabled fault-tolerant routing in MANETs. China Commun 12(8):93–110CrossRefGoogle Scholar
  22. 22.
    Shabut AM, Dahal KP, Bista SK, Awan IU (2015) Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans Mob Comput 14(10):2101–2115CrossRefGoogle Scholar
  23. 23.
    Schweitzer N, Stulman A, Margalit RD, Shabtai A (2017) Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans Mob Comput 16(8):2174–2183CrossRefGoogle Scholar
  24. 24.
    Yi Z, Dohi T (2015) Toward highly dependable power-aware mobile ad hoc network-survivability evaluation framework. IEEE Access 3:2665–2676CrossRefGoogle Scholar
  25. 25.
    Mejri MN, Ben-Othman J (2017) GDVAN: a new greedy behavior attack detection algorithm for VANETs. IEEE Trans Mob Comput 16(3):759–771CrossRefGoogle Scholar
  26. 26.
    Paramasivan B, Prakash MJV, Kaliappan M (2015) Development of a secure routing protocol using game theory model in mobile ad hoc networks. J Commun Netw 17(1):75–83CrossRefGoogle Scholar
  27. 27.
    Ganapathy S, Kulothungan K, Muthurajkumar S, Vijayalakshmi M, Yogesh P, Kannan A (2013) Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J Wirel Commun Netw 271:1–16Google Scholar
  28. 28.
    Logambigai R, Ganapathy S, Kannan A (2018) Energy-efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Comput Electr Eng 68:62–75CrossRefGoogle Scholar
  29. 29.
    Selvi M, Velvizhy P, Ganapathy S, Khanna Nehemiah H, Kannan A (2017) A rule based delay constrained energy efficient routing technique for wireless sensor networks. Clust Comput.  https://doi.org/10.1007/s10586-017-1191-y Google Scholar
  30. 30.
    Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2017) An intelligent secured and energy efficient routing algorithm for MANETs. Wirel Pers Commun 96(2):1753–1769CrossRefGoogle Scholar
  31. 31.
    Zhang W, He X (2018) Stealthy attack detection and solution strategy for consensus-based distributed economic dispatch problem. Int J Electr Power Energy Syst 103:233–246CrossRefGoogle Scholar
  32. 32.
    Li W, Xie L, Wang Z (2018) A novel covert agent for stealthy attacks on industrial control systems using least squares support vector regression. J Electr Comput Eng.  https://doi.org/10.1155/2018/7204939 MathSciNetGoogle Scholar
  33. 33.
    Anakath AS, Rajakumar S, Ambika S (2017) Privacy preserving multi factor authentication using trust management. Clust Comput.  https://doi.org/10.1007/s10586-017-1181-0 Google Scholar

Copyright information

© The Natural Computing Applications Forum 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringUniversity College of Engineering PanrutiCuddaloreIndia
  2. 2.Department of Electronics and Communication EngineeringSt. Joseph’s College of EngineeringChennaiIndia

Personalised recommendations