Skip to main content
Log in

ITCA, an IDS and Trust Solution Collaborated with ACK Based Approach to Mitigate Network Layer Attack on MANET Routing

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The feature of Dynamic topology configuration of MANET reciprocates the security constraints and bring in many security threats that hamper the routing and time bound delivery of packets. Many security schemes had been proposed to secure MANET routing and improve its efficiency. The solutions proposed by existing systems are defined in one dimension so that the targeted attack can be fixed up, but that might create flaws in other dimension or introduce new attack. So it is necessary to create a multidimensional solution that empowers the routing process to become inherently secure rather than defending one particular attack. The selfish or maliciously behaving nodes in the network are the key players in launching the attacks and disrupting the routing process. In this paper, the proposed consolidated approach named, IDS and Trust solution Collaborated with Ack based approach (ITCA), performs identification of attack, isolation of misbehaving nodes and control behavior of nodes in the network. This enables the routing process to be more robust by resisting the malicious nodes from being the part of a route, avoid attack formation and thus supports to improve the efficiency. Even though the malicious nodes are isolated, the proposed method allows them to be sender for transmitting their own data, but under controlled environment defined by IDS so that the attempt to launch DOS attack can be avoided. The reconsideration of isolated node that to under controlled IDS environment in collaboration with Trust and improved ACK based scheme is key behind proposed multidimensional method, ITCA. Further the method is integrated with AODV and extensive experimentation is done based on raising number of malicious nodes in the network to measure its effectiveness and efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Gupta, R., & Jain, C. (2011). Mobile adhoc network (manets): Proposed solution to security related issues. Indian Journal of Computer Science and Engineering (IJCSE), 2(5), 738–746.

    Google Scholar 

  2. Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., & Jamalipour, A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, 14(5), 85–91. https://doi.org/10.1109/MWC.2007.4396947.

    Article  Google Scholar 

  3. Das, K., & Taggu, A. (2014). A comprehensive analysis of dos attacks in mobile adhoc networks, In 2014 International conference on advances in computing, communications and informatics (ICACCI) (pp. 2273–2278). https://doi.org/10.1109/ICACCI.2014.6968561.

  4. Gupta, K., & Gujral, M. (2013). Secure detection technique against blackhole attack for zone routing protocol in manets. International Journal of Application or Innovation in Engineering and Management (IJAIEM), 2(6), 444–448.

    Google Scholar 

  5. Abdelaziz, A. K., Nafaa, M., & Salim, G. (2013). Survey of routing attacks and countermeasures in mobile ad hoc networks In 2013 UKSim 15th international conference on computer modelling and simulation (pp. 693–698). https://doi.org/10.1109/UKSim.2013.48.

  6. Naveena, A., & Reddy, K. R. L. (2018). Malicious node prevention and mitigation in manets using a hybrid security model. Information Security Journal: A Global Perspective, 27(2), 92–101. https://doi.org/10.1080/19393555.2017.1415399.

    Article  Google Scholar 

  7. Dave, D., & Dave, P. (2014). An effective black hole attack detection mechanism using permutation based acknowledgement in manet. In 2014 International conference on advances in computing, communications and informatics (ICACCI) (pp. 1690–1696). https://doi.org/10.1109/ICACCI.2014.6968417.

  8. Bhardwaj, A. (2014). Secure routing in DSR to mitigate black hole attack. In 2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT) (pp. 985–989). https://doi.org/10.1109/ICCICCT.2014.6993102.

  9. Liu, W., & Yu, M. (2014). Aasr: Authenticated anonymous secure routing for manets in adversarial environments. IEEE Transactions on Vehicular Technology, 63(9), 4585–4593. https://doi.org/10.1109/TVT.2014.2313180.

    Article  Google Scholar 

  10. Khan, M. S., Midi, D., Khan, M. I., & Bertino, E. (2017). Fine-grained analysis of packet loss in manets. IEEE Access, 5(2017), 7798–7807. https://doi.org/10.1109/ACCESS.2017.2694467.

    Article  Google Scholar 

  11. Uyyala, S., & Naik, D. (2014). Anomaly based intrusion detection of packet dropping attacks in mobile ad-hoc networks. In 2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT) (pp. 1137–1140). https://doi.org/10.1109/ICCICCT.2014.6993132.

  12. Adhikari, S., & Setua, S. K. (2013Cooperative network intrusion detection system (CNIDS) in mobile adhoc network based on DSR protocol. In Proceedings of 2013 3rd international conference on computer science and network technology (pp. 929–935). https://doi.org/10.1109/ICCSNT.2013.6967257.

  13. Anusha, K., & Sathiyamoorthy, E. (2017). A new trust-based mechanism for detecting intrusions in manet. Information Security Journal: A Global Perspective, 26(4), 153–165. https://doi.org/10.1080/19393555.2017.1328544.

    Article  Google Scholar 

  14. Bhuvaneswari, M., & Naik, D. (July 2014). Secure optimal routing protocol in manets. In 2014 international conference on control, instrumentation, communication and computational technologies (ICCICCT) (pp. 1320–1323). https://doi.org/10.1109/ICCICCT.2014.6993165.

  15. Bouabana-Tebibel, T., Tebibel, N., & Zemmouri, S. (2014). A trust-based probing to secure data routing. In 2014 international conference on advances in computing, communications and informatics (ICACCI) (pp. 1592–1597). https://doi.org/10.1109/ICACCI.2014.6968450.

  16. Sharma, A., Bhuriya, D., Singh, U., & Singh, S. (2014). Prevention of black hole attack in AODV routing algorithm of manet using trust based computing. International Journal of Computer Science and Information Technologies.

  17. Wang, J., Liu, Y., & Jiao, Y. (2011). Building a trusted route in a mobile ad hoc network considering communication reliability and path length. Journal of Network and Computer Applications, 34(4), 1138–1149. https://doi.org/10.1016/j.jnca.2010.11.007. (Advanced Topics in Cloud Computing).

    Article  Google Scholar 

  18. Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H.-M. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114. https://doi.org/10.1016/j.adhoc.2012.02.009. (Theory, algorithms and applications of wireless networked robotics recent advances in vehicular communications and networking).

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nilesh Marathe.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Marathe, N., Shinde, S.K. ITCA, an IDS and Trust Solution Collaborated with ACK Based Approach to Mitigate Network Layer Attack on MANET Routing. Wireless Pers Commun 107, 393–416 (2019). https://doi.org/10.1007/s11277-019-06282-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06282-5

Keywords

Navigation