Skip to main content
Log in

Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

In MANETs, secured communication is considered as a key application. There have been many attempts reported in literature for enhancing security in MANETs. The way of preventing several attacks have been employed so far among which adverting collaborative attacks has become the serious challenge. The nodes which launch collaborative attacks have been detected and eliminated using Collaborative Bait Detection Scheme (CBDS). However, CBDS has failed to enhance the security against the jellyfish attacks which subsequently affect the routing protocol due to poor packet transmission caused by malicious nodes. The present work describes the improved approach for secured transmission by introducing ant colony optimization based clustered based routing protocol (ACO-CBRP). In this method, the clustering of nodes is done using proposed ACO based approach in which the node’s trust value determines routing performance. The nodes having the appropriate trust values enable the calculation of the trust tables of the MANET for detecting the jellyfish attacks. During the process of data transmission, enhanced security can be assured by means of secured key management. The performance evaluation of the present approach is done based on different metrics such as lifetime, overhead and packet delivery ratio using NS-2 simulator platform. The obtained result implies the better performance of the proposed ACO-CBRP approach in mitigating jellyfish attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Eichler, S., Roman, C.: Challenges of secure routing in MANETs: a simulative approach using AODV-SEC. In: 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 481–484 (2006)

  2. Kant, L., Young, K., Younis, O., Shallcross, D., Sinkar, K., Mcauley, A., Graff, C.: Network science based approaches to design and analyze MANETs for military applications. IEEE Commun. Mag. 46(11), 55–61 (2008)

    Article  Google Scholar 

  3. Ci, S., Guizani, M., Chen, H.H., Sharif, H.: Self-regulating network utilization in mobile ad hoc wireless networks. IEEE Trans. Veh. Technol. 55(4), 1302–1310 (2006)

    Article  Google Scholar 

  4. Taneja, S., Kush, A.: A survey of routing protocols in mobile ad hoc networks. Int. J. Innov. Manag. Technol. 1(3), 279 (2010)

    Google Scholar 

  5. Maan, F., Mazhar, N.: MANET routing protocols vs mobility models: a performance evaluation. In: 2011 Third International Conference on Ubiquitous and Future Networks (ICUFN), pp. 179–184 (2011)

  6. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561) (2003)

  7. Clausen, T., Jacquet, P.: Optimized link state routing protocol (OLSR) (No. RFC 3626) (2003)

  8. Shevtekar, A., Anantharam, K., Ansari, N.: Low rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett. 9(4), 363–365 (2005)

    Article  Google Scholar 

  9. Merwe, J.V.D., Dawoud, D., McDonald, S.: A survey on peer-to-peer key management for mobile ad hoc networks. ACM Comput. Surv. (CSUR) 39(1), 1 (2007)

    Article  Google Scholar 

  10. Bhargava, B., de Oliveira, R., Zhang, Y., Idika, N.C.: Addressing collaborative attacks and defense in ad hoc wireless networks. In: 29th IEEE International Conference on Distributed Computing Systems Workshops, 2009. ICDCS Workshops’ 09, pp. 447–450 (2009)

  11. Chang, J.M., Tsou, P.C., Woungang, I., Chao, H.C., Lai, C.F.: Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach. IEEE Syst. J. 9(1), 65–75 (2015)

    Article  Google Scholar 

  12. Weerasinghe, H., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation. In: Future Generation Communication and Networking (FGCN 2007), Vol. 2, pp. 362–367 (2007)

  13. Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Netw. 6(1), 32–46 (2008)

    Article  Google Scholar 

  14. Chen, G., Li, C., Ye, M., Wu, J.: An unequal cluster-based routing protocol in wireless sensor networks. Wirel. Netw. 15(2), 193–207 (2009)

    Article  Google Scholar 

  15. Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad Hoc Networks. In: Paper Presented at the 5th European Personal Mobile Communications Conference, Glasgow, UK, pp. 22–25 (2003)

  16. Al-Shurman, M., Yoo, S-M., Park, S.: Black hole attack in mobile ad hoc networks. In: Paper Presented at the 42nd Annual ACM Southeast Regional Conference (ACM-SE’42), Huntsville, Alabama, 2–3 April 2004

  17. Kozma, W., Lazos, L.: REAct: Resource-efficient accountability for node misbehavior in ad hoc networks based on random audits. In: Paper Presented at the Second ACM Conference on Wireless Network Security, Zurich, Switzerland, pp. 16–18 (2009)

  18. Yu, C.W., Wu, T-K., Cheng, R.H, Chang, S.C.: A distributed and cooperative black hole node detection and elimination mechanism for ad hoc network. In: Paper Presented at the PAKDD Workshops, Nanjing, China, 22–25 May 2007

  19. Wang, W., Bhargava, B., Linderman, M.: Defending against collaborative packet drop attacks on MANETs. In: Paper Presented at the 2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2009) (in Conjunction with IEEE SRDS 2009), New York, USA, 27 September 2009

  20. Min, Z., Jiliu, Z.: Cooperative black hole attack prevention for mobile ad hoc networks. In: Paper Presented at the International Symposium on Information Engineering and Electronic Commerce, Ternopil, Ukraine, 16–17 May 2009

  21. Tsou, P-C., Chang, J-M., Lin, Y-H., Chao, H-C., Chen, J-L.: Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs. In: Paper Presented at the 13th International Conference on Advanced Communication Technology, Phoenix Park, Korea, pp. 13–16 (2011)

  22. Dahill, B., Levine, B., Royer, E., Shields, C.: A secure routing protocol for ad hoc networks. Tech report 02-32, Department of Computer Science, University of Massachusetts, Amherst (2001)

  23. Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS) (2002)

  24. Hu, Y., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of INFOCOM (2003)

  25. Capkun, S., Buttyan, L., Hubaux, J.: Sector: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the ACM workshop on security of ad hoc and sensor networks (2003)

  26. Kianpisheh, S., Charkari, N.M.: Ant colony based constrained workflow scheduling for heterogeneous computing systems. Clust. Comput. 19(3), 1053–1070 (2016)

    Article  Google Scholar 

  27. Yi, S., Naldurg, P., Kravets, R.: Integrating quality of protection into ad hoc routing protocols. In: Proceedings of the 6th World Multi-conference on Systemics, Cybernetics and Informatics (SCI 2002), pp. 286–292 (2002)

  28. Buchegger, S., Le Boudec, J.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02), pp. 226–236 (2002)

  29. Yu, W., Sun, Y., Liu, K.J.R.: HADOF: defense against routing disruptions in mobile ad hoc networks. In: Proceedings of the IEEE INFOCOM, pp. 1252–1261 (2005)

  30. Rajaram, A., Palaniswami, D.S.: Malicious node detection system for mobile ad hoc networks. Int. J. Comput. Sci. Inf. Technol. 1(2), 77–85 (2010)

    Google Scholar 

  31. Kaur, A., Wadhwa, D.S.: Effects of jelly fish attack on mobile ad-hoc network’s routing protocols. IJERA 2248(9622), 1694–1700 (2013)

    Google Scholar 

  32. Laxmi, V., Lal, C., Gaur, M.S., Mehta, D.: JellyFish attack: analysis, detection and countermeasure in TCP-based MANET. J. Inf. Secur. Appl. 22, 99–112 (2015)

    Google Scholar 

  33. Al-Karaki, J., Kamal, A., Ul-Mustafa, R.: On the optimal clustering in mobile ad hoc networks. In: First IEEE Consumer Communications and Networking Conference, 2004. CCNC, pp. 71–76 (2004)

  34. Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: Proceedings of the 27th Australian Conference on Computer Science (ACSC’04), Dunedin, New Zealand, pp. 47– 54 (2004)

  35. Li, X., Lyu, M. R., Liu, J.: A trust model based routing protocol for secure ad hoc networks. In: Proceedings 2004 IEEE Aerospace Conference, Big Sky, MT, USA, pp. 1286–1295 (2004)

  36. Lee, S., Su, W., Gerla, M.: On-demand multicast routing protocol in multihop wireless mobile networks. In: ACM/Baltzer Mobile Networks and Applications, A Special Issue on Multipoint Communication in Wireless Mobile Networks, vol. 7, pp. 441–453 (2002)

  37. Hu, B., Qian, H., Shen, Y., Yan, J.: An optimal path finding strategy in networks based on random walk. Clust. Comput. 19(4), 2179–2188 (2016)

    Article  Google Scholar 

  38. Varatharajan, R., Manogaran, G., Priyan, M. K., Revathi sundarasekar.: Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust. Comput 1–10 (2017)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Satheeshkumar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Satheeshkumar, S., Sengottaiyan, N. Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET. Cluster Comput 22 (Suppl 5), 10849–10860 (2019). https://doi.org/10.1007/s10586-017-1202-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1202-z

Keywords

Navigation