Skip to main content
Erschienen in: Mobile Networks and Applications 4/2021

02.01.2020

Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks

verfasst von: S. Sivanesh, V. R. Sarma Dhulipala

Erschienen in: Mobile Networks and Applications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile Ad-hoc Network (MANETs) is infrastructure less in nature as it is encompassed with a collection of mobile nodes. The self-configurable feature of it has proven to be beneficial in times of disaster relief and rescue operations as the mobile nodes can be effortlessly deployed regardless of the geographical location. In this network, communication take place with the aid of several cooperative routing protocols such as AODV, DSDV, DSR etc., Due to the lack of a centralized administration, the network is prone to copious routing attacks. In this paper, an intrusion detection system called ‘Accurate and Cognitive Intrusion Detection System’ (ACIDS) for detecting the most vulnerable packet dropping attack known as black hole attack has been developed. This system takes the parameters such as Destination Sequence Number (DSN) and Route Reply (RREP) into consideration for detecting the intruders by identifying the deviation of the chosen parameters from the normal behavior. The proposed system has been simulated using NS2 and the analysis of the results attest to the efficacy of ACIDS over AODV routing protocol in detecting packet dropping scenarios of the black hole attack.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat IETF Mobile ad-hoc networks working group (MANET), IETF website, www.ietf.org/dyn/wg/charter/manet-charter.html. IETF Mobile ad-hoc networks working group (MANET), IETF website, ​www.ietf.org/dyn/wg/charter/manet-charter.html.
2.
Zurück zum Zitat Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Commun Surv 15(4):2027–2045CrossRef Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Commun Surv 15(4):2027–2045CrossRef
3.
Zurück zum Zitat Marathe N, Shinde SK (2019) ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on MANET routing. Wirel Pers Commun:1–24 Marathe N, Shinde SK (2019) ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on MANET routing. Wirel Pers Commun:1–24
4.
Zurück zum Zitat Zhou L, Haas ZJ (1999) Securing ad hoc networks. IEEE Netw 13(6):24–30 Zhou L, Haas ZJ (1999) Securing ad hoc networks. IEEE Netw 13(6):24–30
5.
Zurück zum Zitat Deng H, Li W, Agrawal DP (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40(10):70–75 Deng H, Li W, Agrawal DP (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40(10):70–75
6.
Zurück zum Zitat Gurung S, Chauhan S (2019) A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability. Wirel Netw:1–31 Gurung S, Chauhan S (2019) A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability. Wirel Netw:1–31
7.
Zurück zum Zitat Kumar S, Dutta K (2016) Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. SECUR COMMUN NETW 9(14):2484–2556 Kumar S, Dutta K (2016) Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. SECUR COMMUN NETW 9(14):2484–2556
8.
Zurück zum Zitat Su MY, Chiang KL, Liao WC (2010) Mitigation of black-hole nodes in mobile ad hoc networks. In: International symposium on parallel and distributed processing with applications, pp 162–167. IEEE Su MY, Chiang KL, Liao WC (2010) Mitigation of black-hole nodes in mobile ad hoc networks. In: International symposium on parallel and distributed processing with applications, pp 162–167. IEEE
9.
Zurück zum Zitat Babu MR, Usha G (2016) A novel honey pot based detection and isolation approach (NHBADI) to detect and isolate black hole attacks in MANET. Wirel Pers Commun 90(2):831–845 Babu MR, Usha G (2016) A novel honey pot based detection and isolation approach (NHBADI) to detect and isolate black hole attacks in MANET. Wirel Pers Commun 90(2):831–845
10.
Zurück zum Zitat Tseng FH, Chou LD, Chao HC (2011) A survey of black hole attacks in wireless mobile ad hoc networks. HUM-CENT COMPUT INFO 1(1):4 Tseng FH, Chou LD, Chao HC (2011) A survey of black hole attacks in wireless mobile ad hoc networks. HUM-CENT COMPUT INFO 1(1):4
11.
Zurück zum Zitat Madhuri K, Viswanath NK, Gayatri PU (2016) Performance evaluation of AODV under black hole attack in MANET using NS2. In 2016 international conference on ICT in Business Industry & Government (ICTBIG), pp 1–3. IEEE Madhuri K, Viswanath NK, Gayatri PU (2016) Performance evaluation of AODV under black hole attack in MANET using NS2. In 2016 international conference on ICT in Business Industry & Government (ICTBIG), pp 1–3. IEEE
12.
Zurück zum Zitat Gurung S, Chauhan S (2019) Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wirel Netw 25(3):975–988 Gurung S, Chauhan S (2019) Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wirel Netw 25(3):975–988
13.
Zurück zum Zitat Dokurer S, Erten YM, Acar CE (2007) Performance analysis of ad-hoc networks under black hole attacks. In: Proceedings 2007 IEEE SoutheastCon, pp 148–153. IEEE Dokurer S, Erten YM, Acar CE (2007) Performance analysis of ad-hoc networks under black hole attacks. In: Proceedings 2007 IEEE SoutheastCon, pp 148–153. IEEE
14.
Zurück zum Zitat Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans Mob Comput 5:536–550CrossRef Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans Mob Comput 5:536–550CrossRef
15.
Zurück zum Zitat Jayakumar G, Gopinath G (2007) Ad hoc mobile wireless networks routing protocols–a review. J Comput Sci 3(8):574–582 Jayakumar G, Gopinath G (2007) Ad hoc mobile wireless networks routing protocols–a review. J Comput Sci 3(8):574–582
17.
Zurück zum Zitat Shakshuki EM, Kang N, Sheltami TR (2012) EAACK—a secure intrusion-detection system for MANETs. IEEE Trans Ind Electron 60(3):1089–1098 Shakshuki EM, Kang N, Sheltami TR (2012) EAACK—a secure intrusion-detection system for MANETs. IEEE Trans Ind Electron 60(3):1089–1098
18.
Zurück zum Zitat Marti S, Giuli TJ, Lai K, Baker M 2000 Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th annual international conference on mobile computing and networking, pp 255–265. ACM Marti S, Giuli TJ, Lai K, Baker M 2000 Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th annual international conference on mobile computing and networking, pp 255–265. ACM
19.
Zurück zum Zitat Tseng CY, Balasubramanyam P, Ko C, Limprasittiporn R, Rowe J, Levitt K (2003) A specification-based intrusion detection system for AODV. In: Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks, pp 125–134. ACM Tseng CY, Balasubramanyam P, Ko C, Limprasittiporn R, Rowe J, Levitt K (2003) A specification-based intrusion detection system for AODV. In: Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks, pp 125–134. ACM
20.
Zurück zum Zitat Su MY (2011) Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput Commun 34(1):107–117 Su MY (2011) Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput Commun 34(1):107–117
21.
Zurück zum Zitat Raj PN, Swadas PB (2009) Dpraodv: a dyanamic learning system against blackhole attack in aodv based manet. arXiv preprint arXiv:0909.2371 Raj PN, Swadas PB (2009) Dpraodv: a dyanamic learning system against blackhole attack in aodv based manet. arXiv preprint arXiv:0909.2371
Metadaten
Titel
Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks
verfasst von
S. Sivanesh
V. R. Sarma Dhulipala
Publikationsdatum
02.01.2020
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 4/2021
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01505-2

Weitere Artikel der Ausgabe 4/2021

Mobile Networks and Applications 4/2021 Zur Ausgabe

Neuer Inhalt