Advertisement

Cluster Computing

, Volume 22, Supplement 5, pp 10849–10860 | Cite as

Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET

  • S. SatheeshkumarEmail author
  • N. Sengottaiyan
Article

Abstract

In MANETs, secured communication is considered as a key application. There have been many attempts reported in literature for enhancing security in MANETs. The way of preventing several attacks have been employed so far among which adverting collaborative attacks has become the serious challenge. The nodes which launch collaborative attacks have been detected and eliminated using Collaborative Bait Detection Scheme (CBDS). However, CBDS has failed to enhance the security against the jellyfish attacks which subsequently affect the routing protocol due to poor packet transmission caused by malicious nodes. The present work describes the improved approach for secured transmission by introducing ant colony optimization based clustered based routing protocol (ACO-CBRP). In this method, the clustering of nodes is done using proposed ACO based approach in which the node’s trust value determines routing performance. The nodes having the appropriate trust values enable the calculation of the trust tables of the MANET for detecting the jellyfish attacks. During the process of data transmission, enhanced security can be assured by means of secured key management. The performance evaluation of the present approach is done based on different metrics such as lifetime, overhead and packet delivery ratio using NS-2 simulator platform. The obtained result implies the better performance of the proposed ACO-CBRP approach in mitigating jellyfish attacks.

Keywords

Collaborative attacks Jellyfish attacks Collaborative bait detection scheme Ant colony optimization based clustered based routing protocol Secured key management 

References

  1. 1.
    Eichler, S., Roman, C.: Challenges of secure routing in MANETs: a simulative approach using AODV-SEC. In: 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 481–484 (2006)Google Scholar
  2. 2.
    Kant, L., Young, K., Younis, O., Shallcross, D., Sinkar, K., Mcauley, A., Graff, C.: Network science based approaches to design and analyze MANETs for military applications. IEEE Commun. Mag. 46(11), 55–61 (2008)CrossRefGoogle Scholar
  3. 3.
    Ci, S., Guizani, M., Chen, H.H., Sharif, H.: Self-regulating network utilization in mobile ad hoc wireless networks. IEEE Trans. Veh. Technol. 55(4), 1302–1310 (2006)CrossRefGoogle Scholar
  4. 4.
    Taneja, S., Kush, A.: A survey of routing protocols in mobile ad hoc networks. Int. J. Innov. Manag. Technol. 1(3), 279 (2010)Google Scholar
  5. 5.
    Maan, F., Mazhar, N.: MANET routing protocols vs mobility models: a performance evaluation. In: 2011 Third International Conference on Ubiquitous and Future Networks (ICUFN), pp. 179–184 (2011)Google Scholar
  6. 6.
    Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561) (2003)Google Scholar
  7. 7.
    Clausen, T., Jacquet, P.: Optimized link state routing protocol (OLSR) (No. RFC 3626) (2003)Google Scholar
  8. 8.
    Shevtekar, A., Anantharam, K., Ansari, N.: Low rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett. 9(4), 363–365 (2005)CrossRefGoogle Scholar
  9. 9.
    Merwe, J.V.D., Dawoud, D., McDonald, S.: A survey on peer-to-peer key management for mobile ad hoc networks. ACM Comput. Surv. (CSUR) 39(1), 1 (2007)CrossRefGoogle Scholar
  10. 10.
    Bhargava, B., de Oliveira, R., Zhang, Y., Idika, N.C.: Addressing collaborative attacks and defense in ad hoc wireless networks. In: 29th IEEE International Conference on Distributed Computing Systems Workshops, 2009. ICDCS Workshops’ 09, pp. 447–450 (2009)Google Scholar
  11. 11.
    Chang, J.M., Tsou, P.C., Woungang, I., Chao, H.C., Lai, C.F.: Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach. IEEE Syst. J. 9(1), 65–75 (2015)CrossRefGoogle Scholar
  12. 12.
    Weerasinghe, H., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation. In: Future Generation Communication and Networking (FGCN 2007), Vol. 2, pp. 362–367 (2007)Google Scholar
  13. 13.
    Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Netw. 6(1), 32–46 (2008)CrossRefGoogle Scholar
  14. 14.
    Chen, G., Li, C., Ye, M., Wu, J.: An unequal cluster-based routing protocol in wireless sensor networks. Wirel. Netw. 15(2), 193–207 (2009)CrossRefGoogle Scholar
  15. 15.
    Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad Hoc Networks. In: Paper Presented at the 5th European Personal Mobile Communications Conference, Glasgow, UK, pp. 22–25 (2003)Google Scholar
  16. 16.
    Al-Shurman, M., Yoo, S-M., Park, S.: Black hole attack in mobile ad hoc networks. In: Paper Presented at the 42nd Annual ACM Southeast Regional Conference (ACM-SE’42), Huntsville, Alabama, 2–3 April 2004Google Scholar
  17. 17.
    Kozma, W., Lazos, L.: REAct: Resource-efficient accountability for node misbehavior in ad hoc networks based on random audits. In: Paper Presented at the Second ACM Conference on Wireless Network Security, Zurich, Switzerland, pp. 16–18 (2009)Google Scholar
  18. 18.
    Yu, C.W., Wu, T-K., Cheng, R.H, Chang, S.C.: A distributed and cooperative black hole node detection and elimination mechanism for ad hoc network. In: Paper Presented at the PAKDD Workshops, Nanjing, China, 22–25 May 2007Google Scholar
  19. 19.
    Wang, W., Bhargava, B., Linderman, M.: Defending against collaborative packet drop attacks on MANETs. In: Paper Presented at the 2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2009) (in Conjunction with IEEE SRDS 2009), New York, USA, 27 September 2009Google Scholar
  20. 20.
    Min, Z., Jiliu, Z.: Cooperative black hole attack prevention for mobile ad hoc networks. In: Paper Presented at the International Symposium on Information Engineering and Electronic Commerce, Ternopil, Ukraine, 16–17 May 2009Google Scholar
  21. 21.
    Tsou, P-C., Chang, J-M., Lin, Y-H., Chao, H-C., Chen, J-L.: Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs. In: Paper Presented at the 13th International Conference on Advanced Communication Technology, Phoenix Park, Korea, pp. 13–16 (2011)Google Scholar
  22. 22.
    Dahill, B., Levine, B., Royer, E., Shields, C.: A secure routing protocol for ad hoc networks. Tech report 02-32, Department of Computer Science, University of Massachusetts, Amherst (2001)Google Scholar
  23. 23.
    Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS) (2002)Google Scholar
  24. 24.
    Hu, Y., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of INFOCOM (2003)Google Scholar
  25. 25.
    Capkun, S., Buttyan, L., Hubaux, J.: Sector: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the ACM workshop on security of ad hoc and sensor networks (2003)Google Scholar
  26. 26.
    Kianpisheh, S., Charkari, N.M.: Ant colony based constrained workflow scheduling for heterogeneous computing systems. Clust. Comput. 19(3), 1053–1070 (2016)CrossRefGoogle Scholar
  27. 27.
    Yi, S., Naldurg, P., Kravets, R.: Integrating quality of protection into ad hoc routing protocols. In: Proceedings of the 6th World Multi-conference on Systemics, Cybernetics and Informatics (SCI 2002), pp. 286–292 (2002)Google Scholar
  28. 28.
    Buchegger, S., Le Boudec, J.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02), pp. 226–236 (2002)Google Scholar
  29. 29.
    Yu, W., Sun, Y., Liu, K.J.R.: HADOF: defense against routing disruptions in mobile ad hoc networks. In: Proceedings of the IEEE INFOCOM, pp. 1252–1261 (2005)Google Scholar
  30. 30.
    Rajaram, A., Palaniswami, D.S.: Malicious node detection system for mobile ad hoc networks. Int. J. Comput. Sci. Inf. Technol. 1(2), 77–85 (2010)Google Scholar
  31. 31.
    Kaur, A., Wadhwa, D.S.: Effects of jelly fish attack on mobile ad-hoc network’s routing protocols. IJERA 2248(9622), 1694–1700 (2013)Google Scholar
  32. 32.
    Laxmi, V., Lal, C., Gaur, M.S., Mehta, D.: JellyFish attack: analysis, detection and countermeasure in TCP-based MANET. J. Inf. Secur. Appl. 22, 99–112 (2015)Google Scholar
  33. 33.
    Al-Karaki, J., Kamal, A., Ul-Mustafa, R.: On the optimal clustering in mobile ad hoc networks. In: First IEEE Consumer Communications and Networking Conference, 2004. CCNC, pp. 71–76 (2004)Google Scholar
  34. 34.
    Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: Proceedings of the 27th Australian Conference on Computer Science (ACSC’04), Dunedin, New Zealand, pp. 47– 54 (2004)Google Scholar
  35. 35.
    Li, X., Lyu, M. R., Liu, J.: A trust model based routing protocol for secure ad hoc networks. In: Proceedings 2004 IEEE Aerospace Conference, Big Sky, MT, USA, pp. 1286–1295 (2004)Google Scholar
  36. 36.
    Lee, S., Su, W., Gerla, M.: On-demand multicast routing protocol in multihop wireless mobile networks. In: ACM/Baltzer Mobile Networks and Applications, A Special Issue on Multipoint Communication in Wireless Mobile Networks, vol. 7, pp. 441–453 (2002)Google Scholar
  37. 37.
    Hu, B., Qian, H., Shen, Y., Yan, J.: An optimal path finding strategy in networks based on random walk. Clust. Comput. 19(4), 2179–2188 (2016)CrossRefGoogle Scholar
  38. 38.
    Varatharajan, R., Manogaran, G., Priyan, M. K., Revathi sundarasekar.: Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust. Comput 1–10 (2017)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Computer Science and Engineering DepartmentNandha Engineering CollegeErodeIndia
  2. 2.Hindusthan College of Engineering and TechnologyCoimbatoreIndia

Personalised recommendations