Skip to main content
Log in

An efficient packet dropping attack detection mechanism in wireless ad-hoc networks using ECC based AODV-ACO protocol

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The nodes in a Wireless Ad hoc Network (WANET) intercommunicate via wireless links directly or by depending completely on other nodes as routers. Malicious packet dropping and link errors are the major reasons for packet losses in WANET. In some cases, a node does not work appropriately; subsequently, damages the packet transmission. Thus, in WANET, an active Packet Dropping Attack (PDA) detection technique has been proposed by utilizing Elliptic Curve Cryptography (ECC)-centric Ad-hoc On-Demands Vector (AODV)-Ant Colony Optimization (ACO) protocol (ECC-centric AODV-ACO protocol) to trounce the aforementioned complications. Primarily, to detect the PDA, by utilizing the ECC algorithm, security is ensured for every single node. Next, several possible solutions have been engendered by utilizing AODV. From these varied solutions, the finest shortest path is taken with the aid of the ACO algorithm. The attack, which drops the packet, is identified by utilizing the ECC-centric AODV-ACO protocol. Link error and the prevalence of malicious attacks are the sources of packet loss. To permit certain performance, the authentication service is presented in this protocol. Lastly, the proposed methodology’s performance is analogized with the other prevailing models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Abbreviations

WANET:

Wireless Ad hoc Network

PDA:

Packet Dropping Attack

ECC:

Elliptic Curve Cryptography

AODV:

Ad-hoc On-Demands Vector

ACO:

Ant Colony Optimization

MANET:

Mobile Adhoc Network

MN:

Malicious Node

IDS:

Intrusion Detection System

BHA:

Black Hole Attacks

PAMDS:

Power-Aware Malicious Detections for Security

LSAM:

Localized Secure Architectures for MANETs

SMNs:

Security Monitoring Nodes

LF:

Link Failure

RREQ:

Route Request

RREP:

Route Reply

AS:

Ant System

TSP:

Travelling Salesman Problems

EAS:

Elitist plan for AS

HLA:

Homomorphism Linear Authenticator

EC:

Energy Consumption

PDR:

Packet Delivery Ratio

EED:

End-End Delay

EOSR:

Energy Optimized Secure Routing

ESRP:

Efficient and Secure Routing Protocol

TTL:

Time To Live

References

  1. Joseph, C., Swaroop P and Sheshank Reddy Y (2017). Prevention of packet dropping in wireless Ad Hoc networks using HLA algorithm, In International Conference on Innovations in Information, Embedded and Communication Systems. pp. 1–4.

  2. Sneha, C. S., & Jose, B. (2016). Detecting packet dropping attack in wireless ad hoc network. International Journal of Cybernetic Inferface (IJCI), 5(2), 117–124.

    Google Scholar 

  3. Edemacu, K. Euku, M. and Ssekibuule, V. (2014). Packet drop attack detection techniques in wireless ad hoc networks: a review, arXiv preprint arXiv. 1410. 2023.

  4. Arun Kumar Supriya, H. (2017). Detection of packet dropping attacks for privacy preservation in wireless ad-hoc networks. IJSRD - International Journal for Scientific Research & Development, 5(10), 2321–613.

    Google Scholar 

  5. Rajeswari, P. V. N., Krishnaiah, B., & Venkateswar Rao, G. (2016). Detection of packet dropping attacks in wireless AdHoc networks. International Journal of Advanced Research in Computer Science and Software Engineering, 6, 12.

    Google Scholar 

  6. Shu, T., & Krunz, M. (2014). Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 813–828.

    Article  Google Scholar 

  7. Goutham, V., Rajyalaxmi, K., & Shiva parvathi, P. (2016). Privacy preserving error control data detection of packet reducing in wireless Adhoc networks. International Journal of Scientific & Engineering Research, 7(7), 2229–5518.

    Google Scholar 

  8. Jagadesh, G., Sherlin, S., & Jeyaselvi, M. (2016). Detection of link error and attack in Adhoc network. International Journal of Advanced Research in Computer Science Engineering and Information Technology, 4(3), 2321–3337.

    Google Scholar 

  9. Just, M., Kranakis, E and Wan, T. (2003). Resisting malicious packet dropping in wireless ad hoc networks. In International Conference on ad-hoc Networks and Wireless, pp. 151–163.

  10. Choudarygari, S., & Divya, P. N. V. (2017). Privacy preserving and detection of packet dropping attacks in MANETS. International Journal of Computer Science Trends and Technology (IJCST), 5, 2.

    Google Scholar 

  11. Hayajneh, T., Krishnamurthy, P., Tipper, D., and Kim, T. (2009). Detecting malicious packet dropping in the presence of collisions and channel errors in wireless ad hoc networks. In IEEE International Conference on Communications. pp. 1–6,.

  12. Shetty, S. and Sannidhan M. S. (2016). Packet Drop Detection In Wireless Ad Hoc Networks.

  13. Shanida, T. K and Karunan, S. (2017). Packet Dropping in Wireless Ad Hoc Networks. IOSR Journal of Computer Engineering, National Conference on Discrete Mathematics & Computing. 55–60.

  14. Kshirsagar, V. H., Kanthe, A. M., & Simunic, D. (2018). Trust based detection and elimination of packet drop attack in the mobile ad-hoc networks. Wireless Personal Communications., 100(2), 311–320.

    Article  Google Scholar 

  15. Rmayti, M., Khatoun, R., Begriche, Y., Khoukhi, L., & Gaiti, D. (2017). A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks. Computer Networks, 121, 53–64.

    Article  Google Scholar 

  16. Sánchez-Casado, L., Maciá-Fernández, G., García-Teodoro, P., & Magán-Carrión, R. (2015). A model of data forwarding in MANETs for lightweight detection of malicious packet dropping. Computer Networks, 87, 44–58.

    Article  Google Scholar 

  17. Baadache, A., & Belmehdi, A. (2012). Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks. Journal of Network and Computer Applications, 35(3), 1130–1139.

    Article  Google Scholar 

  18. Lal, N., Kumar, S., Saxena, A., & Km, V. (2015). Chaurasiya, Detection of malicious node behaviour via I-watchdog protocol in mobile Ad Hoc network with DSDV routing scheme. Procedia Computer Science, 49, 264–273.

    Article  Google Scholar 

  19. Kukreja, D., Kumar Dhurandher, S., & Reddy, B. V. R. (2018). Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. Journal of Ambient Intelligence and Humanized Computing., 9(4), 941–956.

    Article  Google Scholar 

  20. Poongodi, T., & Karthikeyan, M. (2016). Localized secure routing architecture against cooperative black hole attack in mobile ad hoc networks. Wireless Personal Communications, 90(2), 1039–1050.

    Article  Google Scholar 

  21. Tao Yang, Xu., Xiangyang, L. P., Tonghui, Li., & Leina, P. (2018). A secure routing of wireless sensor networks based on trust evaluation model. Procedia Computer Science, 131, 1156–1163. https://doi.org/10.1016/j.procs.2018.04.289

    Article  Google Scholar 

  22. Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF a trust-aware routing framework for WSNs. J. IEEE Transactions on Dependable & Secure Computing, 9(2), 184–197.

    Article  Google Scholar 

  23. Ganesh, S., & Amutha, R. (2012). Efficient and secure routing protocol for wireless sensor networks through optimal power control and optimal handoff-based recovery mechanism. Journal of Computer Networks and Communications. https://doi.org/10.1155/2012/971685

    Article  Google Scholar 

  24. Nishanth, N., & Mujeeb, A. (2021). Modeling and detection of flooding based denial of service attacks in wireless Ad Hoc networks using uncertain reasoning. IEEE Transactions on Cognitive Communications and Networking, 7(3), 893–904.

    Article  Google Scholar 

  25. Talukdar, I., Hassan, R., Hossen, S., & Ahmad, K. (2021). Faizan Qamar and Amjed Sid Ahmed, Performance improvements of AODV by black hole attack detection using IDS and digital signature. Wireless Communications and Mobile Computing, 2021, 1–13. https://doi.org/10.1155/2021/6693316

    Article  Google Scholar 

  26. Farahani, G. (2021). Black hole attack detection using K-Nearest neighbor algorithm and reputation calculation in mobile Ad Hoc networks. Security and Communication Networks, 2021, 1–15. https://doi.org/10.1155/2021/8814141

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Kanthimathi.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kanthimathi, S., Jhansi Rani, P. An efficient packet dropping attack detection mechanism in wireless ad-hoc networks using ECC based AODV-ACO protocol. Wireless Netw (2022). https://doi.org/10.1007/s11276-022-03156-w

Download citation

  • Published:

  • DOI: https://doi.org/10.1007/s11276-022-03156-w

Keywords

Navigation