Skip to main content
Log in

Multidimensional Multi-Attribute Approach to Counter the Routing Attacks on MANET

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The Dynamic on demand network formation feature of MANET tend to have its biggest the vulnerability that infect the process of route establishment using routing algorithms and exploits many attacks. Identifying the attack and isolating the malicious node to reform the secured routing environment is the major goal of all researchers working for securing the MANET. IDS and trust based collaborative approach (ITCA) is the our first proposed published method which provides the platform for hybrid approach to trap the malicious nodes through combined efforts from multiple dimensions.The proposed framework utilize the benefit of Reputation and Trust based evaluation process to secure route discovery by isolating malicious nodes at early stage of route formation. The more advanced approach, multi-dimensional multi-attribute system (MDMA), incorporates multi-attribute direct, indirect trust mechanism, and use of measured risk by credibility factor, while considering indirect trust. It empowers IDS and make the ITCA more efficient. The attributes considered for calculations of trust are adaptable to change in application environment make MDMA a flexible generalized solution. The MDMA is evaluated by implementing using AODV and compared with our previous proposed method ITCA along with many other solutions. The results are better and more adaptable to the changing environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Kunavut, K. (2014). Performance and comparative analysis of energy consumption for mobile ad hoc routing protocols. In 2014 14th International Symposium on Communications and Information Technologies (ISCIT), pp. 76–79. https://doi.org/10.1109/ISCIT.2014.7011873.

  2. Samara, C., Karapistoli, E., & Economides, A. A. (2012). Performance comparison of MANET routing protocols based on real-life scenarios. In IV International Congress on Ultra Modern Telecommunications and Control Systems, 2012, 870–877. https://doi.org/10.1109/ICUMT.2012.6459784.

  3. Gupta, R., & Jain, C. (2011). Mobile Adhoc network(MANETS): Proposed solution to security related issues. Indian Journal of Computer Science and Engineering (IJCSE), 2(5), 738–746.

    Google Scholar 

  4. Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK x2014; A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089–1098. https://doi.org/10.1109/TIE.2012.2196010.

    Article  Google Scholar 

  5. Sheltami, T., Al-Roubaiey, A., Shakshuki, E., & Mahmoud, A. (2009). Video transmission enhancement in presence of misbehaving nodes in MANETs. Multimedia Systems, 15(5), 273–282. https://doi.org/10.1007/s00530-009-0166-0.

    Article  Google Scholar 

  6. Sandhiya, D., Sangeetha, K., & Latha, R. (2014). Adaptive ACKnowledgement technique with key exchange mechanism for MANET. In 2014 International Conference on Electronics and Communication Systems (ICECS), 2014, pp. 1–5. https://doi.org/10.1109/ECS.2014.6892733.

  7. Balakrishnan, K., Deng, J., & Varshney, V. K. (2005). TWOACK: Preventing selfishness in mobile ad hoc networks. In IEEE Wireless Communications and Networking Conference, 2005, Vol. 4, pp. 2137–2142. https://doi.org/10.1109/WCNC.2005.1424848.

  8. Patil, A., Marathe, N., & Padiya, P. (2015). Improved EAACK scheme for detection and isolation of a malicious node in MANET. In International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), 2015, pp. 529–533. https://doi.org/10.1109/ICATCCT.2015.7456941.

  9. Bhagat, S., Padiya, P., & Marathe, N. (2017). A generic request/reply based algorithm for detection of black hole attack in MANET: Simulation result. In 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Vol. 00, 2017, pp. 1–7. https://doi.org/10.1109/ICCCNT.2017.8204058.

  10. Bhagat, S. P., Padiya, P., & Marathe, N. (2017). A generic request/reply based algorithm for detection of black hole attack in MANET. In International Conference On Smart Technologies For Smart Nation (SmartTechCon), 2017, 1044–1049. https://doi.org/10.1109/SmartTechCon.2017.8358529.

  11. Marathe, N. R., & Shinde, S. K. (2020). Improved itca method to mitigate network-layer attack in manet. In: Jain, L. C., Tsihrintzis, G. A., Balas, V. E., & Sharma, D. K. (Eds.) Data communication and networks. Springer, Singapore, 2020, pp. 245–253. https://doi.org/10.1007/978-981-15-0132-6_16.

  12. Marathe, N., & Shinde, S. K. (2019). ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on MANET routing. Wireless Personal Communications, 107(1), 393–416. https://doi.org/10.1007/s11277-019-06282-5.

    Article  Google Scholar 

  13. Niemegeers, I., & Heemstra de Groot, S. (2002). From personal area networks to personal networks: A user oriented approach. Wireless Personal Communications, 26, 175–186. https://doi.org/10.1023/A:1019912421877.

    Article  Google Scholar 

  14. Majumdar, A., & Banerjee, S. (2015). Different secured routing protocols for mobile Ad Hoc networks and its vulnerabilities: A review. In International Conference and Workshop on Computing and Communication (IEMCON), 2015, 1–5. https://doi.org/10.1109/IEMCON.2015.7344453.

  15. Moudni, H., Er-rouidi, M., Mouncif, H., & Hadadi, B. E.(2016). Modified AODV routing protocol to improve security and performance against black hole attack. In 2016 International Conference on Information Technology for Organizations Development (IT4OD), 2016, pp. 1–7. https://doi.org/10.1109/IT4OD.2016.7479265.

  16. Singh, G., Rishi, R., & Rohil, H. (2016). Secure routing in MANETs using three reliable matrices. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016, pp. 880–884.

  17. Khan, S. M., Nilavalan, R., & Sallama, A. F. (2015). A novel approach for reliable route discovery in mobile ad-hoc network. Wireless Personal Communications, 83(2), 1519–1529. https://doi.org/10.1007/s11277-015-2461-8.

    Article  Google Scholar 

  18. Yadav, S., Trivedi, M. C., Singh, V. K., & Kolhe, M. L. (2017). Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme. In 2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON), 2017, pp. 1–4. https://doi.org/10.1109/UPCON.2017.8251012.

  19. Alsumayt, A., & Haggerty, J. (2014). A survey of the mitigation methods against DoS attacks on MANETs. In Science and Information Conference, 2014, 538–544. https://doi.org/10.1109/SAI.2014.6918239.

  20. Usman, A. B., & Gutierrez, J. (2018). DATM: A dynamic attribute trust model for efficient collaborative routing. J. Ann Oper Res.https://doi.org/10.1007/s10479-018-2864-5.

    Article  Google Scholar 

  21. Saini, R., & Gautam, R. K. (2011). Establishment of dynamic trust among nodes in mobile ad-hoc network. In International Conference on Computational Intelligence and Communication Networks, 2011, 346–349. https://doi.org/10.1109/CICN.2011.73.

  22. Cai, R. J., Li, X. J., & Chong, P. H. J. (2019). An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Transactions on Mobile Computing, 18(1), 42–55. https://doi.org/10.1109/TMC.2018.2828814.

    Article  Google Scholar 

  23. Nadeem, A., & Howarth, M. P. (2013). A survey of MANET intrusion detection and prevention approaches for network layer attacks. IEEE Communications Surveys Tutorials, 15(4), 2027–2045. https://doi.org/10.1109/SURV.2013.030713.00201.

    Article  Google Scholar 

  24. Varma, D. A., & Narayanan, M. (2016). Identifying malicious nodes in mobile ad-hoc networks using polynomial reduction algorithm. In 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016, pp. 1179–1184. https://doi.org/10.1109/ICEEOT.2016.7754870.

  25. Chasaki, D. (2014). Identifying malicious behavior in MANET through data path information. In 2014 International Conference on Computing, Networking and Communications (ICNC), 2014, pp. 567–572. https://doi.org/10.1109/ICCNC.2014.6785398.

  26. Neekhra, A. V. A. C., & Garima, & Patel, S. . (2014). Effect of grayhole attack with Ids technique for AODV routing protocol using network simulator. International Journal of Advanced Research in Computer Engineering and Technology (IJARCET), 3, 4184–4190.

    Google Scholar 

  27. Joshi, V. B., & Goudar, R. H. (2017). Intrusion detection systems in MANETs using hybrid techniques. In International Conference on Smart Technologies for Smart Nation (SmartTechCon), 2017, 534–538. https://doi.org/10.1109/SmartTechCon.2017.8358429.

  28. Sasirekha, D., & Radha, N. (2017). Secure and attack aware routing in mobile ad hoc networks against wormhole and sinkhole attacks. In 2017 2nd International Conference on Communication and Electronics Systems (ICCES), 2017, pp. 505–510. https://doi.org/10.1109/CESYS.2017.8321128.

  29. Yasin, A., & Zant, M. A. (2018). Detecting and isolating black-hole attacks in MANET using timer based baited technique. Hindawi, Wireless Communications and Mobile Computing, 2018, 10. https://doi.org/10.1155/2018/9812135.

    Article  Google Scholar 

  30. Can, A. B., & Bhargava, B. (2013). SORT: A self-organizing trust model for peer-to-peer systems. IEEE Transactions on Dependable and Secure Computing, 10(1), 14–27. https://doi.org/10.1109/TDSC.2012.74.

    Article  Google Scholar 

  31. Bouabana-Tebibel, T., Tebibel, N., & Zemmouri, S. (2014). A trust-based probing to secure data routing. In: 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2014, pp. 1592–1597. https://doi.org/10.1109/ICACCI.2014.6968450.

  32. Sharma, A., Bhuriya, D., Singh, U., & Singh, S. (2014). Prevention of black hole attack in AODV routing algorithm of MANET using trust based computing. https://doi.org/10.1.1.640.2105.

  33. Wang, J., Liu, Y., & Jiao, Y. (2011). Building a trusted route in a mobile ad hoc network considering communication reliability and path length. Journal of Network and Computer Applications 34(4): 1138–1149, advanced Topics in Cloud Computing. https://doi.org/10.1016/j.jnca.2010.11.007. http://www.sciencedirect.com/science/article/pii/S1084804510002055

  34. Ahmed, M., & Hussain, M. A. (2014). Performance of an IDS in an Adhoc network under black hole and gray hole attacks. In International Conference on Electronics, Communication and Instrumentation (ICECI), 2014, pp. 1–4. https://doi.org/10.1109/ICECI.2014.6767377.

  35. Patidar, K., & Dubey, V. (2014). Modification in routing mechanism of AODV for defending blackhole and wormhole attacks. In 2014 Conference on IT in Business, Industry and Government (CSIBIG), 2014, pp. 1–6. https://doi.org/10.1109/CSIBIG.2014.7056976.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nilesh R. Marathe.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Marathe, N.R., Shinde, S.K. Multidimensional Multi-Attribute Approach to Counter the Routing Attacks on MANET. Wireless Pers Commun 119, 1993–2016 (2021). https://doi.org/10.1007/s11277-021-08315-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08315-4

Keywords

Navigation