Skip to main content
Top
Published in: Wireless Networks 8/2015

01-11-2015

A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks

Authors: Rutvij H. Jhaveri, Narendra M. Patel

Published in: Wireless Networks | Issue 8/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless shared medium, randomly moving nodes and multi-hop architecture make mobile ad hoc networks vulnerable to various network layer threats. Grayhole attack is such a prominent network layer threat, in which a malevolent node attempts to establish a bogus route passing through itself and performs packet forwarding misbehavior by dropping a subset of the received data packets in order to degrade the network performance. In this paper, we address this issue by proposing a heuristic approach, referred to as sequence number based bait detection scheme, which attempts to isolate malevolent nodes during route discovery process. The mechanism is incorporated with ad hoc on-demand distance vector routing protocol. Performance of the proposed scheme is compared with an existing scheme under three grayhole adversary models adopting distinct mode of operations. Simulation results under various network parameters depict that the proposed scheme improves network performance depending upon the mode of operations of the adversaries.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Taheri, M., & Bagheri, M. (2014). High secure routing protocol with authentication and confidentiality increased in wireless ad hoc networks. Arabian Journal for Science and Engineering, 39(2), 1135–1145.CrossRef Taheri, M., & Bagheri, M. (2014). High secure routing protocol with authentication and confidentiality increased in wireless ad hoc networks. Arabian Journal for Science and Engineering, 39(2), 1135–1145.CrossRef
2.
go back to reference Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In IEEE INFOCOM (pp. 100–110). IEEE Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In IEEE INFOCOM (pp. 100–110). IEEE
3.
go back to reference Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180.CrossRef Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180.CrossRef
4.
go back to reference Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. Systems Journal, IEEE, 9(1), 65–75.CrossRef Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. Systems Journal, IEEE, 9(1), 65–75.CrossRef
5.
go back to reference Rahimi, M. R., Venkatasubramanian, N., Mehrotra, S., & Vasilakos, A. V. (2012). MAPCloud: Mobile applications on an elastic and scalable 2-tier cloud architecture. In 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing (pp. 83–90). IEEE Computer Society. Rahimi, M. R., Venkatasubramanian, N., Mehrotra, S., & Vasilakos, A. V. (2012). MAPCloud: Mobile applications on an elastic and scalable 2-tier cloud architecture. In 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing (pp. 83–90). IEEE Computer Society.
6.
go back to reference Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.CrossRef Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293–315.CrossRef
7.
go back to reference Sanandaji, A., Jabbehdari, S., Balador, A., & Kanellopoulos, D. (2013). MAC layer misbehavior in MANETs. IETE Technical Review, 30(4), 324–335.CrossRef Sanandaji, A., Jabbehdari, S., Balador, A., & Kanellopoulos, D. (2013). MAC layer misbehavior in MANETs. IETE Technical Review, 30(4), 324–335.CrossRef
8.
go back to reference Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. Wireless Communications, IEEE, 20(6), 91–98.CrossRef Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. (2013). A survey on the IETF protocol suite for the internet of things: Standards, challenges, and opportunities. Wireless Communications, IEEE, 20(6), 91–98.CrossRef
9.
go back to reference Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H. M. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.CrossRef Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H. M. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.CrossRef
10.
go back to reference Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). A novel solution for grayhole attack in AODV based MANETs. In International Conference on Advances in Communication, Network and Computing (pp. 60–67). Berlin Heidelberg: Springer. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). A novel solution for grayhole attack in AODV based MANETs. In International Conference on Advances in Communication, Network and Computing (pp. 60–67). Berlin Heidelberg: Springer.
11.
go back to reference Zafar, H., Zuhairi, M., Harle, D., & Andonovic, I. (2012). A survey of quality of service-aware routing approaches for mobile ad hoc networks. IETE Technical Review, 29(3), 222–227. Zafar, H., Zuhairi, M., Harle, D., & Andonovic, I. (2012). A survey of quality of service-aware routing approaches for mobile ad hoc networks. IETE Technical Review, 29(3), 222–227.
12.
go back to reference Yang, B., Yamamoto, R., & Tanaka, Y. (2014). Dempster–Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. In International Conference on Advanced Communication Technology (pp. 223–232). IEEE. Yang, B., Yamamoto, R., & Tanaka, Y. (2014). Dempster–Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. In International Conference on Advanced Communication Technology (pp. 223–232). IEEE.
13.
go back to reference Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.CrossRef Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.CrossRef
14.
go back to reference Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.CrossRef
15.
go back to reference Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18(4), 1234–1247.CrossRef Fadlullah, Z. M., Taleb, T., Vasilakos, A. V., Guizani, M., & Kato, N. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking (TON), 18(4), 1234–1247.CrossRef
16.
go back to reference Xiang, L., Luo, J., & Vasilakos, A. (2011). Compressed data aggregation for energy efficient wireless sensor networks. In 8th Annual IEEE Communications society conference on Sensor, mesh and ad hoc communications and networks (SECON) (pp. 46–54). IEEE. Xiang, L., Luo, J., & Vasilakos, A. (2011). Compressed data aggregation for energy efficient wireless sensor networks. In 8th Annual IEEE Communications society conference on Sensor, mesh and ad hoc communications and networks (SECON) (pp. 46–54). IEEE.
17.
go back to reference Jhaveri, R. H., Patel, A. D., & Dangarwala, K. J. (2012). Comprehensive study of various DoS attacks and defense approaches in MANETs. In International Conference on Emerging Trends in Science, Engineering and Technology (pp. 25–31). IEEE. Jhaveri, R. H., Patel, A. D., & Dangarwala, K. J. (2012). Comprehensive study of various DoS attacks and defense approaches in MANETs. In International Conference on Emerging Trends in Science, Engineering and Technology (pp. 25–31). IEEE.
18.
go back to reference Zhang, X., Zhou, F., Zhu, X., Sun, H., Perrig, A., Vasilakos, A. V., & Guan, H. (2014). DFL: Secure and practical fault localization for datacenter networks. IEEE/ACM Transactions on Networking, 22(4), 1218–1231.CrossRef Zhang, X., Zhou, F., Zhu, X., Sun, H., Perrig, A., Vasilakos, A. V., & Guan, H. (2014). DFL: Secure and practical fault localization for datacenter networks. IEEE/ACM Transactions on Networking, 22(4), 1218–1231.CrossRef
19.
go back to reference Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering, 40(2), 530–538.CrossRef Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Computers & Electrical Engineering, 40(2), 530–538.CrossRef
20.
go back to reference Shila, D. M., Cheng, Y., & Anjali, T. (2009). Channel-aware detection of gray hole attacks in wireless mesh networks. In Global Telecommunications Conference (pp. 1–6). IEEE. Shila, D. M., Cheng, Y., & Anjali, T. (2009). Channel-aware detection of gray hole attacks in wireless mesh networks. In Global Telecommunications Conference (pp. 1–6). IEEE.
21.
go back to reference Sen, J., Chandra, M. G., Harihara, S. G., Reddy, H., & Balamuralidhar, P. (2007). A mechanism for detection of gray hole attack in mobile ad hoc networks. In 6th International Conference on Information, Communications & Signal Processing (pp. 1–5). IEEE. Sen, J., Chandra, M. G., Harihara, S. G., Reddy, H., & Balamuralidhar, P. (2007). A mechanism for detection of gray hole attack in mobile ad hoc networks. In 6th International Conference on Information, Communications & Signal Processing (pp. 1–5). IEEE.
22.
go back to reference Mamatha, G. S., & Sharma, S. C. (2010). A robust approach to detect and prevent network layer attacks in MANETS. International Journal of Computer Science and Security, 4(3), 275–284. Mamatha, G. S., & Sharma, S. C. (2010). A robust approach to detect and prevent network layer attacks in MANETS. International Journal of Computer Science and Security, 4(3), 275–284.
23.
go back to reference Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef Yang, H., Zhang, Y., Zhou, Y., Fu, X., Liu, H., & Vasilakos, A. V. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.CrossRef
24.
go back to reference Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). Seccloud: Bridging secure storage and computation in cloud. In IEEE 30th International Conference on Distributed Computing Systems Workshops (pp. 52–61). IEEE. Wei, L., Zhu, H., Cao, Z., Jia, W., & Vasilakos, A. V. (2010). Seccloud: Bridging secure storage and computation in cloud. In IEEE 30th International Conference on Distributed Computing Systems Workshops (pp. 52–61). IEEE.
25.
go back to reference Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.CrossRef Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371–386.CrossRef
26.
go back to reference Zhang, Z., Wang, H., Vasilakos, A. V., & Fang, H. (2012). ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070–1078.CrossRef Zhang, Z., Wang, H., Vasilakos, A. V., & Fang, H. (2012). ECG-cryptography and authentication in body area networks. IEEE Transactions on Information Technology in Biomedicine, 16(6), 1070–1078.CrossRef
27.
go back to reference Perkins, C., Belding-Royer, E., & Das, S. (2003). RFC 3561-ad hoc on-demand distance vector (AODV) routing. In Internet RFCs, pp. 1–38. Perkins, C., Belding-Royer, E., & Das, S. (2003). RFC 3561-ad hoc on-demand distance vector (AODV) routing. In Internet RFCs, pp. 1–38.
28.
go back to reference Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef
29.
go back to reference He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRef He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRef
30.
go back to reference Hiremani, V. A., & Jadhao, M. M. (2013). Eliminating co-operative blackhole and grayhole attacks using modified EDRI table in MANET. In International Conference on Green Computing, Communication and Conservation of Energy (pp. 944–948). IEEE. Hiremani, V. A., & Jadhao, M. M. (2013). Eliminating co-operative blackhole and grayhole attacks using modified EDRI table in MANET. In International Conference on Green Computing, Communication and Conservation of Energy (pp. 944–948). IEEE.
31.
go back to reference Bindra, G. S., Kapoor, A., Narang, A., & Agrawal, A. (2012). Detection and removal of co-operative blackhole and grayhole attacks in MANETs. In IEEE International Conference on System Engineering and Technology (pp. 1–5). IEEE. Bindra, G. S., Kapoor, A., Narang, A., & Agrawal, A. (2012). Detection and removal of co-operative blackhole and grayhole attacks in MANETs. In IEEE International Conference on System Engineering and Technology (pp. 1–5). IEEE.
32.
go back to reference Zhou, L., Chao, H. C., & Vasilakos, A. V. (2011). Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358–1367.CrossRef Zhou, L., Chao, H. C., & Vasilakos, A. V. (2011). Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE Journal on Selected Areas in Communications, 29(7), 1358–1367.CrossRef
33.
go back to reference Khattak, H., Nizamuddin, N., Khurshid, F., & Amin, N. (2013). Preventing black and gray hole attacks in AODV using optimal path routing and hash. In 10th IEEE International Conference on Networking, Sensing and Control (pp. 645–648). IEEE. Khattak, H., Nizamuddin, N., Khurshid, F., & Amin, N. (2013). Preventing black and gray hole attacks in AODV using optimal path routing and hash. In 10th IEEE International Conference on Networking, Sensing and Control (pp. 645–648). IEEE.
34.
go back to reference Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In Proceeding of International Conference on Advanced Computing & Communication Technologies (pp. 254–260). IEEE. Jhaveri, R. H. (2013). MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs. In Proceeding of International Conference on Advanced Computing & Communication Technologies (pp. 254–260). IEEE.
35.
go back to reference Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP Journal of Computer Science, 11(1), 1–12. Jhaveri, R. H., Patel, S. J., & Jinwala, D. C. (2012). Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs. INFOCOMP Journal of Computer Science, 11(1), 1–12.
36.
go back to reference Jhaveri, R. H. (2013). Reliable approach to prevent blackhole and grayholes attacks in mobile ad hoc networks. In H. F. Rashvand & H. C. Chao (Eds.), Dynamic ad hoc networks (pp. 261–280). UK: IET. Jhaveri, R. H. (2013). Reliable approach to prevent blackhole and grayholes attacks in mobile ad hoc networks. In H. F. Rashvand & H. C. Chao (Eds.), Dynamic ad hoc networks (pp. 261–280). UK: IET.
37.
go back to reference Dhane, A., & Sharma, S. (2008). Modeling and analysis of sequence number attack and its detection in AODV. In 16th IEEE International Conference on Networks (pp. 1–6). IEEE. Dhane, A., & Sharma, S. (2008). Modeling and analysis of sequence number attack and its detection in AODV. In 16th IEEE International Conference on Networks (pp. 1–6). IEEE.
38.
go back to reference Patel, A. D., & Chawda, K. (2015). Dual security against grayhole attack in MANETs. In L. C. Jain, S. Patnaik, & N. Ichalkaranje (Eds.), Intelligent computing, communication and devices (pp. 33–37). India: Springer. Patel, A. D., & Chawda, K. (2015). Dual security against grayhole attack in MANETs. In L. C. Jain, S. Patnaik, & N. Ichalkaranje (Eds.), Intelligent computing, communication and devices (pp. 33–37). India: Springer.
Metadata
Title
A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks
Authors
Rutvij H. Jhaveri
Narendra M. Patel
Publication date
01-11-2015
Publisher
Springer US
Published in
Wireless Networks / Issue 8/2015
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-015-0945-9

Other articles of this Issue 8/2015

Wireless Networks 8/2015 Go to the issue