Advertisement

Wireless Networks

, Volume 21, Issue 8, pp 2781–2798 | Cite as

A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks

  • Rutvij H. Jhaveri
  • Narendra M. Patel
Article

Abstract

Wireless shared medium, randomly moving nodes and multi-hop architecture make mobile ad hoc networks vulnerable to various network layer threats. Grayhole attack is such a prominent network layer threat, in which a malevolent node attempts to establish a bogus route passing through itself and performs packet forwarding misbehavior by dropping a subset of the received data packets in order to degrade the network performance. In this paper, we address this issue by proposing a heuristic approach, referred to as sequence number based bait detection scheme, which attempts to isolate malevolent nodes during route discovery process. The mechanism is incorporated with ad hoc on-demand distance vector routing protocol. Performance of the proposed scheme is compared with an existing scheme under three grayhole adversary models adopting distinct mode of operations. Simulation results under various network parameters depict that the proposed scheme improves network performance depending upon the mode of operations of the adversaries.

Keywords

Mobile ad hoc networks AODV Packet forwarding misbehavior Grayhole attack Secure routing Bait detection scheme Effect of adversary models 

Notes

Acknowledgments

The authors would like to thank the management of SVM Institute of Technology, Bharuch, India and the management of CSPIT, Charotar University of Science & Technology, Changa, India for providing necessary assistance in carrying out the research work. Special thank goes to Prof. (Dr.) D.C. Jinwala, SVNIT, Surat, India and Prof. (Dr.) Robert J. van Glabbeek, NICTA, Sydney, Australia for their able guidance and motivation. We are also thankful to Prof. Ankit D. Patel, SVM Institute of Technology, Bharuch, India for providing valuable inputs during this research work. We would also like to thank the anonymous reviewers and the editors.

References

  1. 1.
    Taheri, M., & Bagheri, M. (2014). High secure routing protocol with authentication and confidentiality increased in wireless ad hoc networks. Arabian Journal for Science and Engineering, 39(2), 1135–1145.CrossRefGoogle Scholar
  2. 2.
    Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In IEEE INFOCOM (pp. 100–110). IEEEGoogle Scholar
  3. 3.
    Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180.CrossRefGoogle Scholar
  4. 4.
    Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. Systems Journal, IEEE, 9(1), 65–75.CrossRefGoogle Scholar
  5. 5.
    Rahimi, M. R., Venkatasubramanian, N., Mehrotra, S., & Vasilakos, A. V. (2012). MAPCloud: Mobile applications on an elastic and scalable 2-tier cloud architecture. In 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing (pp. 83–90). IEEE Computer Society.Google Scholar
  6. 6.
    Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.CrossRefGoogle Scholar
  7. 7.
    Sanandaji, A., Jabbehdari, S., Balador, A., & Kanellopoulos, D. (2013). MAC layer misbehavior in MANETs. IETE Technical Review, 30(4), 324–335.CrossRefGoogle Scholar
  8. 8.
    Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. Wireless Communications, IEEE, 20(6), 91–98.CrossRefGoogle Scholar
  9. 9.
    Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H. M. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.CrossRefGoogle Scholar
  10. 10.
    Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). A novel solution for grayhole attack in AODV based MANETs. In International Conference on Advances in Communication, Network and Computing (pp. 60–67). Berlin Heidelberg: Springer.Google Scholar
  11. 11.
    Zafar, H., Zuhairi, M., Harle, D., & Andonovic, I. (2012). A survey of quality of service-aware routing approaches for mobile ad hoc networks. IETE Technical Review, 29(3), 222–227.Google Scholar
  12. 12.
    Yang, B., Yamamoto, R., & Tanaka, Y. (2014). Dempster–Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. In International Conference on Advanced Communication Technology (pp. 223–232). IEEE.Google Scholar
  13. 13.
    Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.CrossRefGoogle Scholar
  14. 14.
    Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRefGoogle Scholar
  15. 15.
    Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18(4), 1234–1247.CrossRefGoogle Scholar
  16. 16.
    Xiang, L., Luo, J., & Vasilakos, A. (2011). Compressed data aggregation for energy efficient wireless sensor networks. In 8th Annual IEEE Communications society conference on Sensor, mesh and ad hoc communications and networks (SECON) (pp. 46–54). IEEE.Google Scholar
  17. 17.
    Jhaveri, R. H., Patel, A. D., & Dangarwala, K. J. (2012). Comprehensive study of various DoS attacks and defense approaches in MANETs. In International Conference on Emerging Trends in Science, Engineering and Technology (pp. 25–31). IEEE.Google Scholar
  18. 18.
    Zhang, X., Zhou, F., Zhu, X., Sun, H., Perrig, A., Vasilakos, A. V., & Guan, H. (2014). DFL: Secure and practical fault localization for datacenter networks. IEEE/ACM Transactions on Networking, 22(4), 1218–1231.CrossRefGoogle Scholar
  19. 19.
    Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering, 40(2), 530–538.CrossRefGoogle Scholar
  20. 20.
    Shila, D. M., Cheng, Y., & Anjali, T. (2009). Channel-aware detection of gray hole attacks in wireless mesh networks. In Global Telecommunications Conference (pp. 1–6). IEEE.Google Scholar
  21. 21.
    Sen, J., Chandra, M. G., Harihara, S. G., Reddy, H., & Balamuralidhar, P. (2007). A mechanism for detection of gray hole attack in mobile ad hoc networks. In 6th International Conference on Information, Communications & Signal Processing (pp. 1–5). IEEE.Google Scholar
  22. 22.
    Mamatha, G. S., & Sharma, S. C. (2010). A robust approach to detect and prevent network layer attacks in MANETS. International Journal of Computer Science and Security, 4(3), 275–284.Google Scholar
  23. 23.
    Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRefGoogle Scholar
  24. 24.
    Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). Seccloud: Bridging secure storage and computation in cloud. In IEEE 30th International Conference on Distributed Computing Systems Workshops (pp. 52–61). IEEE.Google Scholar
  25. 25.
    Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.CrossRefGoogle Scholar
  26. 26.
    Zhang, Z., Wang, H., Vasilakos, A. V., & Fang, H. (2012). ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070–1078.CrossRefGoogle Scholar
  27. 27.
    Perkins, C., Belding-Royer, E., & Das, S. (2003). RFC 3561-ad hoc on-demand distance vector (AODV) routing. In Internet RFCs, pp. 1–38.Google Scholar
  28. 28.
    Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRefGoogle Scholar
  29. 29.
    He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRefGoogle Scholar
  30. 30.
    Hiremani, V. A., & Jadhao, M. M. (2013). Eliminating co-operative blackhole and grayhole attacks using modified EDRI table in MANET. In International Conference on Green Computing, Communication and Conservation of Energy (pp. 944–948). IEEE.Google Scholar
  31. 31.
    Bindra, G. S., Kapoor, A., Narang, A., & Agrawal, A. (2012). Detection and removal of co-operative blackhole and grayhole attacks in MANETs. In IEEE International Conference on System Engineering and Technology (pp. 1–5). IEEE.Google Scholar
  32. 32.
    Zhou, L., Chao, H. C., & Vasilakos, A. V. (2011). Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358–1367.CrossRefGoogle Scholar
  33. 33.
    Khattak, H., Nizamuddin, N., Khurshid, F., & Amin, N. (2013). Preventing black and gray hole attacks in AODV using optimal path routing and hash. In 10th IEEE International Conference on Networking, Sensing and Control (pp. 645–648). IEEE.Google Scholar
  34. 34.
    Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In Proceeding of International Conference on Advanced Computing & Communication Technologies (pp. 254–260). IEEE.Google Scholar
  35. 35.
    Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP Journal of Computer Science, 11(1), 1–12.Google Scholar
  36. 36.
    Jhaveri, R. H. (2013). Reliable approach to prevent blackhole and grayholes attacks in mobile ad hoc networks. In H. F. Rashvand & H. C. Chao (Eds.), Dynamic ad hoc networks (pp. 261–280). UK: IET.Google Scholar
  37. 37.
    Dhane, A., & Sharma, S. (2008). Modeling and analysis of sequence number attack and its detection in AODV. In 16th IEEE International Conference on Networks (pp. 1–6). IEEE.Google Scholar
  38. 38.
    Patel, A. D., & Chawda, K. (2015). Dual security against grayhole attack in MANETs. In L. C. Jain, S. Patnaik, & N. Ichalkaranje (Eds.), Intelligent computing, communication and devices (pp. 33–37). India: Springer.Google Scholar
  39. 39.
    The network simulator-ns-2. (2015). http://www.isi.edu/nsnam/ns/

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.Department of Computer Engineering, CSPITCharotar University of Science & TechnologyChangaIndia
  2. 2.Department of Computer EngineeringBirla Vishvakarma MahavidyalayaVallabh VidyanagarIndia

Personalised recommendations