Skip to main content
Erschienen in: Wireless Personal Communications 1/2021

13.08.2020

Defending Against Smart Grayhole Attack Within MANETs: A Reputation-Based Ant Colony Optimization Approach for Secure Route Discovery in DSR Protocol

verfasst von: Kaoutar Ourouss, Najib Naja, Abdellah Jamali

Erschienen in: Wireless Personal Communications | Ausgabe 1/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Moving randomly without any centralized authority, dynamic nodes constitute the Mobile Adhoc Networks on the basis of fully-fledged cooperation and native trustworthiness. Unfortunately, in real scenarios, the malicious nodes take advantage of this inherent trustworthiness to settle in and perform their suspicious activities. In the light of the growing concerns about security attacks in hostile environments, new challenges have emerged to thwart routing attacks including the smart grayhole attack, which adversely affects the availability and accuracy of the network by dropping data packets. This paper addresses this disturbing attack by monitoring the behavior of the participating nodes through a bio-inspired trust management model. The distributed trustworthiness assessment model is based on the beta reputation system combined with the Ant Colony Optimization (ACO) metaheuristic. The main focus of the beta reputation system is rating the nodes according to their successful tasks and their consumed energy, while the ACO metaheuristic maintains this reputation metric during the discovery process and calculates the preference value of each traversed path to select the most secure one. The proposed model improves the traditional Dynamic Source Routing (DSR) protocol by isolating the malicious nodes from participation in data packets transmission. The simulations conducted with the network simulator 2, show that despite the presence of numerous gray holes, the reputation-based ACO DSR (RACODSR) outperforms the standard DSR in terms of packet loss ratio by a decrease of 9.8%, packet delivery ratio by an increase of 0.22%, throughput by an increase of 0.4%, jitter by a decrease of 22.76%, the end to end delay by a decrease of 2.51% and the consumed energy by a decrease of 0.17%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abdel-Fattah, F., Farhan, K. A., Al-Tarawneh, F. H., & AlTamimi, F. (2019). Security challenges and attacks in dynamic mobile ad hoc networks manets. In 2019 IEEE jordan international joint conference on electrical engineering and information technology (JEEIT) (pp. 28–33). Abdel-Fattah, F., Farhan, K. A., Al-Tarawneh, F. H., & AlTamimi, F. (2019). Security challenges and attacks in dynamic mobile ad hoc networks manets. In 2019 IEEE jordan international joint conference on electrical engineering and information technology (JEEIT) (pp. 28–33).
2.
Zurück zum Zitat Anwar, N., & Deng, H. (2015). Ant colony optimization based multicast routing algorithm for mobile ad hoc networks. In 2015 advances in wireless and optical communications (RTUWO) (pp. 62–67). Anwar, N., & Deng, H. (2015). Ant colony optimization based multicast routing algorithm for mobile ad hoc networks. In 2015 advances in wireless and optical communications (RTUWO) (pp. 62–67).
3.
Zurück zum Zitat Awerbuch, B., Holmer, D., Nita-Rotaru, C., & Rubens, H. (2002). An on-demand secure routing protocol resilient to byzantine failures. In Proceedings of the 2002 ACM workshop on wireless security, Atlanta, GA, USA, September 28, 2002 (pp. 21–30). Awerbuch, B., Holmer, D., Nita-Rotaru, C., & Rubens, H. (2002). An on-demand secure routing protocol resilient to byzantine failures. In Proceedings of the 2002 ACM workshop on wireless security, Atlanta, GA, USA, September 28, 2002 (pp. 21–30).
4.
Zurück zum Zitat Balan, E. V., Priyan, M., Gokulnath, C., & Devi, G. U. (2015). Fuzzy based intrusion detection systems in manet. Procedia Computer Science, 50, 109–114.CrossRef Balan, E. V., Priyan, M., Gokulnath, C., & Devi, G. U. (2015). Fuzzy based intrusion detection systems in manet. Procedia Computer Science, 50, 109–114.CrossRef
5.
Zurück zum Zitat Cai, J., Yi, P., Chen, J., Wang, Z., & Liu, N. (2010). An adaptive approach to detecting black and gray hole attacks in ad hoc network. In 2010 24th IEEE international conference on advanced information networking and applications (pp. 775–780). Cai, J., Yi, P., Chen, J., Wang, Z., & Liu, N. (2010). An adaptive approach to detecting black and gray hole attacks in ad hoc network. In 2010 24th IEEE international conference on advanced information networking and applications (pp. 775–780).
7.
Zurück zum Zitat Hoang, D. T. (2008). Metaheuristics for np-hard combinatorial optimization problems. Ph.D. thesis, National University of Singapore. Hoang, D. T. (2008). Metaheuristics for np-hard combinatorial optimization problems. Ph.D. thesis, National University of Singapore.
8.
Zurück zum Zitat Hu, Y., Johnson, D. B., & Perrig, A. (2003). SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1), 175–192.CrossRef Hu, Y., Johnson, D. B., & Perrig, A. (2003). SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1), 175–192.CrossRef
9.
Zurück zum Zitat Huang, Q., Avramopoulos, I. C., Kobayashi, H., & Liu, B. (2005). Secure data forwarding in wireless ad hoc networks. In Proceedings of IEEE international conference on communications, ICC 2005, Seoul, Korea, 16–20 May 2005 (pp. 3525–3531). Huang, Q., Avramopoulos, I. C., Kobayashi, H., & Liu, B. (2005). Secure data forwarding in wireless ad hoc networks. In Proceedings of IEEE international conference on communications, ICC 2005, Seoul, Korea, 16–20 May 2005 (pp. 3525–3531).
10.
Zurück zum Zitat IEEE. (2002). Securing ad hoc routing protocols. ACM. IEEE. (2002). Securing ad hoc routing protocols. ACM.
11.
Zurück zum Zitat Just, M., Kranakis, E., & Wan, T. (2003). Resisting malicious packet dropping in wireless ad hoc networks. In Ad-hoc, mobile, and wireless networks, second international conference, ADHOC-NOW 2003 Montreal, Canada, October 8–10, 2003, proceedings (pp. 151–163). Just, M., Kranakis, E., & Wan, T. (2003). Resisting malicious packet dropping in wireless ad hoc networks. In Ad-hoc, mobile, and wireless networks, second international conference, ADHOC-NOW 2003 Montreal, Canada, October 8–10, 2003, proceedings (pp. 151–163).
13.
Zurück zum Zitat Kim, T. K., & Seo, H. S. (2008). A trust model using fuzzy logic in wireless sensor network. World Academy of Science, Engineering and Technology, 42(6), 63–66. Kim, T. K., & Seo, H. S. (2008). A trust model using fuzzy logic in wireless sensor network. World Academy of Science, Engineering and Technology, 42(6), 63–66.
14.
Zurück zum Zitat Lee, G., Seo, J., & Kim, D. (2008). An approach to mitigate wormhole attack in wireless ad hoc networks. In 2008 international conference on information security and assurance (ISA 2008) (pp. 220–225). Lee, G., Seo, J., & Kim, D. (2008). An approach to mitigate wormhole attack in wireless ad hoc networks. In 2008 international conference on information security and assurance (ISA 2008) (pp. 220–225).
15.
Zurück zum Zitat Li, C., Hwang, M., & Chu, Y. (2008). Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks. International Journal of Computer Systems Science and Engineering, 23(3), 227–234. Li, C., Hwang, M., & Chu, Y. (2008). Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks. International Journal of Computer Systems Science and Engineering, 23(3), 227–234.
16.
Zurück zum Zitat Marti, S., Giuli, T.J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In MOBICOM 2000, proceedings of the sixth annual international conference on mobile computing and networking, Boston, MA, USA, August 6–11, 2000 (pp. 255–265). Marti, S., Giuli, T.J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In MOBICOM 2000, proceedings of the sixth annual international conference on mobile computing and networking, Boston, MA, USA, August 6–11, 2000 (pp. 255–265).
17.
Zurück zum Zitat Moradiya, P., & Sampalli, S. (2010). Detection and prevention of routing intrusions in mobile ad hoc networks. In IEEE/IFIP 8th international conference on embedded and ubiquitous computing, EUC 2010, Hong Kong, China, 11–13 December 2010 (pp. 542–547). Moradiya, P., & Sampalli, S. (2010). Detection and prevention of routing intrusions in mobile ad hoc networks. In IEEE/IFIP 8th international conference on embedded and ubiquitous computing, EUC 2010, Hong Kong, China, 11–13 December 2010 (pp. 542–547).
18.
Zurück zum Zitat NDSS. (2001). Efficient and secure source authentication for multicast (Vol. 1). NDSS. (2001). Efficient and secure source authentication for multicast (Vol. 1).
19.
Zurück zum Zitat Ourouss, K., Naja, N., & Jamali, A. (2016). Efficiency analysis of manets routing based on a new double metric with mobility and density models. In 13th IEEE/ACS international conference of computer systems and applications, AICCSA 2016, Agadir, Morocco, November 29–December 2, 2016 (pp. 1–8). Ourouss, K., Naja, N., & Jamali, A. (2016). Efficiency analysis of manets routing based on a new double metric with mobility and density models. In 13th IEEE/ACS international conference of computer systems and applications, AICCSA 2016, Agadir, Morocco, November 29–December 2, 2016 (pp. 1–8).
20.
Zurück zum Zitat Papadimitratos, P., & Haas, Z. J. (2003). Secure link state routing for mobile ad hoc networks. In 2003 symposium on applications and the internet workshops (SAINT 2003), 27–31 January 2003—Orlando, FL, USA, proceedings, pp. 379–383. Papadimitratos, P., & Haas, Z. J. (2003). Secure link state routing for mobile ad hoc networks. In 2003 symposium on applications and the internet workshops (SAINT 2003), 27–31 January 2003—Orlando, FL, USA, proceedings, pp. 379–383.
21.
Zurück zum Zitat Papadimitratos, P., & Haas, Z. J. (2003). Secure message transmission in mobile ad hoc networks. Ad Hoc Networks, 1(1), 193–209.CrossRef Papadimitratos, P., & Haas, Z. J. (2003). Secure message transmission in mobile ad hoc networks. Ad Hoc Networks, 1(1), 193–209.CrossRef
22.
Zurück zum Zitat Patcha, A., & Mishra, A. (2003). Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In Radio and wireless conference, 2003. RAWCON’03. Proceedings (pp. 75–78). Patcha, A., & Mishra, A. (2003). Collaborative security architecture for black hole attack prevention in mobile ad hoc networks. In Radio and wireless conference, 2003. RAWCON’03. Proceedings (pp. 75–78).
23.
Zurück zum Zitat Perlman, R. J. (1988). Network layer protocols with byzantine robustness. Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA, USA. Perlman, R. J. (1988). Network layer protocols with byzantine robustness. Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA, USA.
24.
Zurück zum Zitat Prakasam, A., & Savarimuthu, N. (2015). Metaheuristic algorithms and polynomial turing reductions: A case study based on ant colony optimization. Procedia Computer Science, 46, 388–395.CrossRef Prakasam, A., & Savarimuthu, N. (2015). Metaheuristic algorithms and polynomial turing reductions: A case study based on ant colony optimization. Procedia Computer Science, 46, 388–395.CrossRef
25.
Zurück zum Zitat Rathiga, P., & Sathappan, S. (2016). Hybrid detection of black hole and gray hole attacks in manet. In: 2016 international conference on computation system and information technology for sustainable solutions (CSITSS) (pp. 135–140). Rathiga, P., & Sathappan, S. (2016). Hybrid detection of black hole and gray hole attacks in manet. In: 2016 international conference on computation system and information technology for sustainable solutions (CSITSS) (pp. 135–140).
26.
Zurück zum Zitat Sharma, P., & Trivedi, A. (2011). An approach to defend against wormhole attack in ad hoc network using digital signature. In 2011 IEEE 3rd international conference on communication software and networks (pp. 307–311). Sharma, P., & Trivedi, A. (2011). An approach to defend against wormhole attack in ad hoc network using digital signature. In 2011 IEEE 3rd international conference on communication software and networks (pp. 307–311).
27.
Zurück zum Zitat Wang, J., & Shi, H. (2009). A secure DSR protocol based on the request sequence-number. In 2009 5th international conference on wireless communications, networking and mobile computing (pp. 1–4). Wang, J., & Shi, H. (2009). A secure DSR protocol based on the request sequence-number. In 2009 5th international conference on wireless communications, networking and mobile computing (pp. 1–4).
28.
Zurück zum Zitat Xiaopeng, G., & Wei, C. (2007). A novel gray hole attack detection scheme for mobile ad-hoc networks. In 2007 IFIP international conference on network and parallel computing workshops (NPC 2007) (pp. 209–214). Xiaopeng, G., & Wei, C. (2007). A novel gray hole attack detection scheme for mobile ad-hoc networks. In 2007 IFIP international conference on network and parallel computing workshops (NPC 2007) (pp. 209–214).
29.
Zurück zum Zitat Yang, B., Yamamoto, R., & Tanaka, Y. (2014). Dempster–Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in manets. In 16th international conference on advanced communication technology (pp. 223–232). Yang, B., Yamamoto, R., & Tanaka, Y. (2014). Dempster–Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in manets. In 16th international conference on advanced communication technology (pp. 223–232).
30.
Zurück zum Zitat Yi, P., Jiang, Y., Zhong, Y., & Zhang, S. (2005). Distributed intrusion detection for mobile ad hoc networks. In 2005 IEEE/IPSJ international symposium on applications and the internet workshops (SAINT 2005 workshops), 31 January–4 February 2005, Trento, Italy (pp. 94–97). Yi, P., Jiang, Y., Zhong, Y., & Zhang, S. (2005). Distributed intrusion detection for mobile ad hoc networks. In 2005 IEEE/IPSJ international symposium on applications and the internet workshops (SAINT 2005 workshops), 31 January–4 February 2005, Trento, Italy (pp. 94–97).
31.
Zurück zum Zitat Yu, M., Zhou, M., & Su, W. (2009). A secure routing protocol against byzantine attacks for MANETs in adversarial environments. IEEE Transactions on Vehicular Technology, 58(1), 449–460.CrossRef Yu, M., Zhou, M., & Su, W. (2009). A secure routing protocol against byzantine attacks for MANETs in adversarial environments. IEEE Transactions on Vehicular Technology, 58(1), 449–460.CrossRef
32.
Zurück zum Zitat Zahariadis, T., Leligou, H. C., Trakadas, P., & Voliotis, S. (2010). Trust management in wireless sensor networks. European Transactions on Telecommunications, 21(4), 386–395. Zahariadis, T., Leligou, H. C., Trakadas, P., & Voliotis, S. (2010). Trust management in wireless sensor networks. European Transactions on Telecommunications, 21(4), 386–395.
33.
Zurück zum Zitat Zeshan, M., Khan, S. A., Cheema, A. R., & Ahmed, A. (2008). Adding security against packet dropping attack in mobile ad hoc networks. In: 2008 international seminar on future information technology and management engineering (pp. 568–572). Zeshan, M., Khan, S. A., Cheema, A. R., & Ahmed, A. (2008). Adding security against packet dropping attack in mobile ad hoc networks. In: 2008 international seminar on future information technology and management engineering (pp. 568–572).
34.
Zurück zum Zitat Zhang, C., Zhou, M., & Yu, M. (2007). Ad hoc network routing and security: A review. International Journal of Communication Systems, 20(8), 909–925.CrossRef Zhang, C., Zhou, M., & Yu, M. (2007). Ad hoc network routing and security: A review. International Journal of Communication Systems, 20(8), 909–925.CrossRef
Metadaten
Titel
Defending Against Smart Grayhole Attack Within MANETs: A Reputation-Based Ant Colony Optimization Approach for Secure Route Discovery in DSR Protocol
verfasst von
Kaoutar Ourouss
Najib Naja
Abdellah Jamali
Publikationsdatum
13.08.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07711-6

Weitere Artikel der Ausgabe 1/2021

Wireless Personal Communications 1/2021 Zur Ausgabe

Neuer Inhalt