Skip to main content
Erschienen in: Wireless Networks 8/2015

01.11.2015

A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks

verfasst von: Rutvij H. Jhaveri, Narendra M. Patel

Erschienen in: Wireless Networks | Ausgabe 8/2015

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless shared medium, randomly moving nodes and multi-hop architecture make mobile ad hoc networks vulnerable to various network layer threats. Grayhole attack is such a prominent network layer threat, in which a malevolent node attempts to establish a bogus route passing through itself and performs packet forwarding misbehavior by dropping a subset of the received data packets in order to degrade the network performance. In this paper, we address this issue by proposing a heuristic approach, referred to as sequence number based bait detection scheme, which attempts to isolate malevolent nodes during route discovery process. The mechanism is incorporated with ad hoc on-demand distance vector routing protocol. Performance of the proposed scheme is compared with an existing scheme under three grayhole adversary models adopting distinct mode of operations. Simulation results under various network parameters depict that the proposed scheme improves network performance depending upon the mode of operations of the adversaries.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Taheri, M., & Bagheri, M. (2014). High secure routing protocol with authentication and confidentiality increased in wireless ad hoc networks. Arabian Journal for Science and Engineering, 39(2), 1135–1145.CrossRef Taheri, M., & Bagheri, M. (2014). High secure routing protocol with authentication and confidentiality increased in wireless ad hoc networks. Arabian Journal for Science and Engineering, 39(2), 1135–1145.CrossRef
2.
Zurück zum Zitat Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In IEEE INFOCOM (pp. 100–110). IEEE Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In IEEE INFOCOM (pp. 100–110). IEEE
3.
Zurück zum Zitat Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180.CrossRef Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180.CrossRef
4.
Zurück zum Zitat Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. Systems Journal, IEEE, 9(1), 65–75.CrossRef Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. Systems Journal, IEEE, 9(1), 65–75.CrossRef
5.
Zurück zum Zitat Rahimi, M. R., Venkatasubramanian, N., Mehrotra, S., & Vasilakos, A. V. (2012). MAPCloud: Mobile applications on an elastic and scalable 2-tier cloud architecture. In 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing (pp. 83–90). IEEE Computer Society. Rahimi, M. R., Venkatasubramanian, N., Mehrotra, S., & Vasilakos, A. V. (2012). MAPCloud: Mobile applications on an elastic and scalable 2-tier cloud architecture. In 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing (pp. 83–90). IEEE Computer Society.
6.
Zurück zum Zitat Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.CrossRef Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.CrossRef
7.
Zurück zum Zitat Sanandaji, A., Jabbehdari, S., Balador, A., & Kanellopoulos, D. (2013). MAC layer misbehavior in MANETs. IETE Technical Review, 30(4), 324–335.CrossRef Sanandaji, A., Jabbehdari, S., Balador, A., & Kanellopoulos, D. (2013). MAC layer misbehavior in MANETs. IETE Technical Review, 30(4), 324–335.CrossRef
8.
Zurück zum Zitat Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. Wireless Communications, IEEE, 20(6), 91–98.CrossRef Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. Wireless Communications, IEEE, 20(6), 91–98.CrossRef
9.
Zurück zum Zitat Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H. M. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.CrossRef Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H. M. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.CrossRef
10.
Zurück zum Zitat Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). A novel solution for grayhole attack in AODV based MANETs. In International Conference on Advances in Communication, Network and Computing (pp. 60–67). Berlin Heidelberg: Springer. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). A novel solution for grayhole attack in AODV based MANETs. In International Conference on Advances in Communication, Network and Computing (pp. 60–67). Berlin Heidelberg: Springer.
11.
Zurück zum Zitat Zafar, H., Zuhairi, M., Harle, D., & Andonovic, I. (2012). A survey of quality of service-aware routing approaches for mobile ad hoc networks. IETE Technical Review, 29(3), 222–227. Zafar, H., Zuhairi, M., Harle, D., & Andonovic, I. (2012). A survey of quality of service-aware routing approaches for mobile ad hoc networks. IETE Technical Review, 29(3), 222–227.
12.
Zurück zum Zitat Yang, B., Yamamoto, R., & Tanaka, Y. (2014). Dempster–Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. In International Conference on Advanced Communication Technology (pp. 223–232). IEEE. Yang, B., Yamamoto, R., & Tanaka, Y. (2014). Dempster–Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. In International Conference on Advanced Communication Technology (pp. 223–232). IEEE.
13.
Zurück zum Zitat Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.CrossRef Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.CrossRef
14.
Zurück zum Zitat Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef
15.
Zurück zum Zitat Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18(4), 1234–1247.CrossRef Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18(4), 1234–1247.CrossRef
16.
Zurück zum Zitat Xiang, L., Luo, J., & Vasilakos, A. (2011). Compressed data aggregation for energy efficient wireless sensor networks. In 8th Annual IEEE Communications society conference on Sensor, mesh and ad hoc communications and networks (SECON) (pp. 46–54). IEEE. Xiang, L., Luo, J., & Vasilakos, A. (2011). Compressed data aggregation for energy efficient wireless sensor networks. In 8th Annual IEEE Communications society conference on Sensor, mesh and ad hoc communications and networks (SECON) (pp. 46–54). IEEE.
17.
Zurück zum Zitat Jhaveri, R. H., Patel, A. D., & Dangarwala, K. J. (2012). Comprehensive study of various DoS attacks and defense approaches in MANETs. In International Conference on Emerging Trends in Science, Engineering and Technology (pp. 25–31). IEEE. Jhaveri, R. H., Patel, A. D., & Dangarwala, K. J. (2012). Comprehensive study of various DoS attacks and defense approaches in MANETs. In International Conference on Emerging Trends in Science, Engineering and Technology (pp. 25–31). IEEE.
18.
Zurück zum Zitat Zhang, X., Zhou, F., Zhu, X., Sun, H., Perrig, A., Vasilakos, A. V., & Guan, H. (2014). DFL: Secure and practical fault localization for datacenter networks. IEEE/ACM Transactions on Networking, 22(4), 1218–1231.CrossRef Zhang, X., Zhou, F., Zhu, X., Sun, H., Perrig, A., Vasilakos, A. V., & Guan, H. (2014). DFL: Secure and practical fault localization for datacenter networks. IEEE/ACM Transactions on Networking, 22(4), 1218–1231.CrossRef
19.
Zurück zum Zitat Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering, 40(2), 530–538.CrossRef Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering, 40(2), 530–538.CrossRef
20.
Zurück zum Zitat Shila, D. M., Cheng, Y., & Anjali, T. (2009). Channel-aware detection of gray hole attacks in wireless mesh networks. In Global Telecommunications Conference (pp. 1–6). IEEE. Shila, D. M., Cheng, Y., & Anjali, T. (2009). Channel-aware detection of gray hole attacks in wireless mesh networks. In Global Telecommunications Conference (pp. 1–6). IEEE.
21.
Zurück zum Zitat Sen, J., Chandra, M. G., Harihara, S. G., Reddy, H., & Balamuralidhar, P. (2007). A mechanism for detection of gray hole attack in mobile ad hoc networks. In 6th International Conference on Information, Communications & Signal Processing (pp. 1–5). IEEE. Sen, J., Chandra, M. G., Harihara, S. G., Reddy, H., & Balamuralidhar, P. (2007). A mechanism for detection of gray hole attack in mobile ad hoc networks. In 6th International Conference on Information, Communications & Signal Processing (pp. 1–5). IEEE.
22.
Zurück zum Zitat Mamatha, G. S., & Sharma, S. C. (2010). A robust approach to detect and prevent network layer attacks in MANETS. International Journal of Computer Science and Security, 4(3), 275–284. Mamatha, G. S., & Sharma, S. C. (2010). A robust approach to detect and prevent network layer attacks in MANETS. International Journal of Computer Science and Security, 4(3), 275–284.
23.
Zurück zum Zitat Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef
24.
Zurück zum Zitat Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). Seccloud: Bridging secure storage and computation in cloud. In IEEE 30th International Conference on Distributed Computing Systems Workshops (pp. 52–61). IEEE. Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). Seccloud: Bridging secure storage and computation in cloud. In IEEE 30th International Conference on Distributed Computing Systems Workshops (pp. 52–61). IEEE.
25.
Zurück zum Zitat Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.CrossRef Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.CrossRef
26.
Zurück zum Zitat Zhang, Z., Wang, H., Vasilakos, A. V., & Fang, H. (2012). ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070–1078.CrossRef Zhang, Z., Wang, H., Vasilakos, A. V., & Fang, H. (2012). ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070–1078.CrossRef
27.
Zurück zum Zitat Perkins, C., Belding-Royer, E., & Das, S. (2003). RFC 3561-ad hoc on-demand distance vector (AODV) routing. In Internet RFCs, pp. 1–38. Perkins, C., Belding-Royer, E., & Das, S. (2003). RFC 3561-ad hoc on-demand distance vector (AODV) routing. In Internet RFCs, pp. 1–38.
28.
Zurück zum Zitat Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef
29.
Zurück zum Zitat He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRef He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRef
30.
Zurück zum Zitat Hiremani, V. A., & Jadhao, M. M. (2013). Eliminating co-operative blackhole and grayhole attacks using modified EDRI table in MANET. In International Conference on Green Computing, Communication and Conservation of Energy (pp. 944–948). IEEE. Hiremani, V. A., & Jadhao, M. M. (2013). Eliminating co-operative blackhole and grayhole attacks using modified EDRI table in MANET. In International Conference on Green Computing, Communication and Conservation of Energy (pp. 944–948). IEEE.
31.
Zurück zum Zitat Bindra, G. S., Kapoor, A., Narang, A., & Agrawal, A. (2012). Detection and removal of co-operative blackhole and grayhole attacks in MANETs. In IEEE International Conference on System Engineering and Technology (pp. 1–5). IEEE. Bindra, G. S., Kapoor, A., Narang, A., & Agrawal, A. (2012). Detection and removal of co-operative blackhole and grayhole attacks in MANETs. In IEEE International Conference on System Engineering and Technology (pp. 1–5). IEEE.
32.
Zurück zum Zitat Zhou, L., Chao, H. C., & Vasilakos, A. V. (2011). Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358–1367.CrossRef Zhou, L., Chao, H. C., & Vasilakos, A. V. (2011). Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358–1367.CrossRef
33.
Zurück zum Zitat Khattak, H., Nizamuddin, N., Khurshid, F., & Amin, N. (2013). Preventing black and gray hole attacks in AODV using optimal path routing and hash. In 10th IEEE International Conference on Networking, Sensing and Control (pp. 645–648). IEEE. Khattak, H., Nizamuddin, N., Khurshid, F., & Amin, N. (2013). Preventing black and gray hole attacks in AODV using optimal path routing and hash. In 10th IEEE International Conference on Networking, Sensing and Control (pp. 645–648). IEEE.
34.
Zurück zum Zitat Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In Proceeding of International Conference on Advanced Computing & Communication Technologies (pp. 254–260). IEEE. Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In Proceeding of International Conference on Advanced Computing & Communication Technologies (pp. 254–260). IEEE.
35.
Zurück zum Zitat Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP Journal of Computer Science, 11(1), 1–12. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP Journal of Computer Science, 11(1), 1–12.
36.
Zurück zum Zitat Jhaveri, R. H. (2013). Reliable approach to prevent blackhole and grayholes attacks in mobile ad hoc networks. In H. F. Rashvand & H. C. Chao (Eds.), Dynamic ad hoc networks (pp. 261–280). UK: IET. Jhaveri, R. H. (2013). Reliable approach to prevent blackhole and grayholes attacks in mobile ad hoc networks. In H. F. Rashvand & H. C. Chao (Eds.), Dynamic ad hoc networks (pp. 261–280). UK: IET.
37.
Zurück zum Zitat Dhane, A., & Sharma, S. (2008). Modeling and analysis of sequence number attack and its detection in AODV. In 16th IEEE International Conference on Networks (pp. 1–6). IEEE. Dhane, A., & Sharma, S. (2008). Modeling and analysis of sequence number attack and its detection in AODV. In 16th IEEE International Conference on Networks (pp. 1–6). IEEE.
38.
Zurück zum Zitat Patel, A. D., & Chawda, K. (2015). Dual security against grayhole attack in MANETs. In L. C. Jain, S. Patnaik, & N. Ichalkaranje (Eds.), Intelligent computing, communication and devices (pp. 33–37). India: Springer. Patel, A. D., & Chawda, K. (2015). Dual security against grayhole attack in MANETs. In L. C. Jain, S. Patnaik, & N. Ichalkaranje (Eds.), Intelligent computing, communication and devices (pp. 33–37). India: Springer.
Metadaten
Titel
A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks
verfasst von
Rutvij H. Jhaveri
Narendra M. Patel
Publikationsdatum
01.11.2015
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 8/2015
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-015-0945-9

Weitere Artikel der Ausgabe 8/2015

Wireless Networks 8/2015 Zur Ausgabe

Neuer Inhalt