Skip to main content
Top
Published in: Mobile Networks and Applications 4/2021

02-01-2020

Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks

Authors: S. Sivanesh, V. R. Sarma Dhulipala

Published in: Mobile Networks and Applications | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile Ad-hoc Network (MANETs) is infrastructure less in nature as it is encompassed with a collection of mobile nodes. The self-configurable feature of it has proven to be beneficial in times of disaster relief and rescue operations as the mobile nodes can be effortlessly deployed regardless of the geographical location. In this network, communication take place with the aid of several cooperative routing protocols such as AODV, DSDV, DSR etc., Due to the lack of a centralized administration, the network is prone to copious routing attacks. In this paper, an intrusion detection system called ‘Accurate and Cognitive Intrusion Detection System’ (ACIDS) for detecting the most vulnerable packet dropping attack known as black hole attack has been developed. This system takes the parameters such as Destination Sequence Number (DSN) and Route Reply (RREP) into consideration for detecting the intruders by identifying the deviation of the chosen parameters from the normal behavior. The proposed system has been simulated using NS2 and the analysis of the results attest to the efficacy of ACIDS over AODV routing protocol in detecting packet dropping scenarios of the black hole attack.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference IETF Mobile ad-hoc networks working group (MANET), IETF website, www.ietf.org/dyn/wg/charter/manet-charter.html. IETF Mobile ad-hoc networks working group (MANET), IETF website, ​www.ietf.org/dyn/wg/charter/manet-charter.html.
2.
go back to reference Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Commun Surv 15(4):2027–2045CrossRef Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection & prevention approaches for network layer attacks. IEEE Commun Surv 15(4):2027–2045CrossRef
3.
go back to reference Marathe N, Shinde SK (2019) ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on MANET routing. Wirel Pers Commun:1–24 Marathe N, Shinde SK (2019) ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on MANET routing. Wirel Pers Commun:1–24
4.
go back to reference Zhou L, Haas ZJ (1999) Securing ad hoc networks. IEEE Netw 13(6):24–30 Zhou L, Haas ZJ (1999) Securing ad hoc networks. IEEE Netw 13(6):24–30
5.
go back to reference Deng H, Li W, Agrawal DP (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40(10):70–75 Deng H, Li W, Agrawal DP (2002) Routing security in wireless ad hoc networks. IEEE Commun Mag 40(10):70–75
6.
go back to reference Gurung S, Chauhan S (2019) A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability. Wirel Netw:1–31 Gurung S, Chauhan S (2019) A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability. Wirel Netw:1–31
7.
go back to reference Kumar S, Dutta K (2016) Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. SECUR COMMUN NETW 9(14):2484–2556 Kumar S, Dutta K (2016) Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges. SECUR COMMUN NETW 9(14):2484–2556
8.
go back to reference Su MY, Chiang KL, Liao WC (2010) Mitigation of black-hole nodes in mobile ad hoc networks. In: International symposium on parallel and distributed processing with applications, pp 162–167. IEEE Su MY, Chiang KL, Liao WC (2010) Mitigation of black-hole nodes in mobile ad hoc networks. In: International symposium on parallel and distributed processing with applications, pp 162–167. IEEE
9.
go back to reference Babu MR, Usha G (2016) A novel honey pot based detection and isolation approach (NHBADI) to detect and isolate black hole attacks in MANET. Wirel Pers Commun 90(2):831–845 Babu MR, Usha G (2016) A novel honey pot based detection and isolation approach (NHBADI) to detect and isolate black hole attacks in MANET. Wirel Pers Commun 90(2):831–845
10.
go back to reference Tseng FH, Chou LD, Chao HC (2011) A survey of black hole attacks in wireless mobile ad hoc networks. HUM-CENT COMPUT INFO 1(1):4 Tseng FH, Chou LD, Chao HC (2011) A survey of black hole attacks in wireless mobile ad hoc networks. HUM-CENT COMPUT INFO 1(1):4
11.
go back to reference Madhuri K, Viswanath NK, Gayatri PU (2016) Performance evaluation of AODV under black hole attack in MANET using NS2. In 2016 international conference on ICT in Business Industry & Government (ICTBIG), pp 1–3. IEEE Madhuri K, Viswanath NK, Gayatri PU (2016) Performance evaluation of AODV under black hole attack in MANET using NS2. In 2016 international conference on ICT in Business Industry & Government (ICTBIG), pp 1–3. IEEE
12.
go back to reference Gurung S, Chauhan S (2019) Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wirel Netw 25(3):975–988 Gurung S, Chauhan S (2019) Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wirel Netw 25(3):975–988
13.
go back to reference Dokurer S, Erten YM, Acar CE (2007) Performance analysis of ad-hoc networks under black hole attacks. In: Proceedings 2007 IEEE SoutheastCon, pp 148–153. IEEE Dokurer S, Erten YM, Acar CE (2007) Performance analysis of ad-hoc networks under black hole attacks. In: Proceedings 2007 IEEE SoutheastCon, pp 148–153. IEEE
14.
go back to reference Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans Mob Comput 5:536–550CrossRef Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans Mob Comput 5:536–550CrossRef
15.
go back to reference Jayakumar G, Gopinath G (2007) Ad hoc mobile wireless networks routing protocols–a review. J Comput Sci 3(8):574–582 Jayakumar G, Gopinath G (2007) Ad hoc mobile wireless networks routing protocols–a review. J Comput Sci 3(8):574–582
17.
go back to reference Shakshuki EM, Kang N, Sheltami TR (2012) EAACK—a secure intrusion-detection system for MANETs. IEEE Trans Ind Electron 60(3):1089–1098 Shakshuki EM, Kang N, Sheltami TR (2012) EAACK—a secure intrusion-detection system for MANETs. IEEE Trans Ind Electron 60(3):1089–1098
18.
go back to reference Marti S, Giuli TJ, Lai K, Baker M 2000 Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th annual international conference on mobile computing and networking, pp 255–265. ACM Marti S, Giuli TJ, Lai K, Baker M 2000 Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th annual international conference on mobile computing and networking, pp 255–265. ACM
19.
go back to reference Tseng CY, Balasubramanyam P, Ko C, Limprasittiporn R, Rowe J, Levitt K (2003) A specification-based intrusion detection system for AODV. In: Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks, pp 125–134. ACM Tseng CY, Balasubramanyam P, Ko C, Limprasittiporn R, Rowe J, Levitt K (2003) A specification-based intrusion detection system for AODV. In: Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks, pp 125–134. ACM
20.
go back to reference Su MY (2011) Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput Commun 34(1):107–117 Su MY (2011) Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput Commun 34(1):107–117
21.
go back to reference Raj PN, Swadas PB (2009) Dpraodv: a dyanamic learning system against blackhole attack in aodv based manet. arXiv preprint arXiv:0909.2371 Raj PN, Swadas PB (2009) Dpraodv: a dyanamic learning system against blackhole attack in aodv based manet. arXiv preprint arXiv:0909.2371
Metadata
Title
Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks
Authors
S. Sivanesh
V. R. Sarma Dhulipala
Publication date
02-01-2020
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 4/2021
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01505-2

Other articles of this Issue 4/2021

Mobile Networks and Applications 4/2021 Go to the issue