Skip to main content
Top
Published in: Wireless Personal Communications 1/2022

06-01-2022

An Efficient Security Framework for Trusted and Secure Routing in MANET: A Comprehensive Solution

Published in: Wireless Personal Communications | Issue 1/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Secure routing of data in MANET (Mobile Ad-hoc Network) is an important concern to save the network from various attacks such as blackhole attack, wormhole attack, and gray-hole attack. MANET handles various sensitive data arrived from different applications in various fields and more prone to different attacks due to its dynamic characteristics. Since they are self-configured in nature and nodes in the network can freely move from one location area (LA) to another LA without any central control, the network topology can be varied from time to time. So there is a need for an efficient security framework to improve the performance of the network with three performance metrics such as throughput, packet delivery rate, and end-end delay. This paper presents a detailed security analysis of routing in MANET and proposed an efficient security framework to detect and isolate blackhole attack, wormhole attack, and grayhole attack from the network. These attacks harms the network than any other attacks in the environment during the routing process. The paper also presents an efficient detection scheme based on three QoS parameters such as shortest route, reliability rate, and a capability based protocol. The proposed scheme introduces threshold based countermeasure in each node to provide trustworthy route for the communication between nodes in the network. The threshold value helps to identify the trustworthiness of all the nodes connected in the environment. Throughout this process, the communication channel can be securely connected with source and target nodes to provide high secure environment. The proposed work is compared with the state-of-the art secure routing schemes such as cognitive energy efficient trusted routing technique (CEMT), trust based secure routing protocol (TSRM), trust aware routing framework in terms of throughput, packet delivery rate, and delay. Based on the findings of this study, a trusted based routing solution needs to be deployed, which can effectively isolate the attacks such as blackhole attacks, wormhole attacks, and gray-hole attacks from the network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Anitha, D., & Punithavalli, M. (2013). A Collaborative selfish replica with watchdog and pathrater in MANETS. International Journal of Computer Science and Mobile Computing (IJCSMC), 2(3), 112–119. Anitha, D., & Punithavalli, M. (2013). A Collaborative selfish replica with watchdog and pathrater in MANETS. International Journal of Computer Science and Mobile Computing (IJCSMC), 2(3), 112–119.
2.
go back to reference Sharma, B., & Singh, A. K. (2014). A token based protocol for mutual exclusion in mobile ad hoc networks. Journal of Information Processing Systems, 10, 36–54.CrossRef Sharma, B., & Singh, A. K. (2014). A token based protocol for mutual exclusion in mobile ad hoc networks. Journal of Information Processing Systems, 10, 36–54.CrossRef
3.
go back to reference Bao, F., Chen, I. R., Chang, M., & Cho, J. H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.CrossRef Bao, F., Chen, I. R., Chang, M., & Cho, J. H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.CrossRef
4.
go back to reference Butun, I., Morgera, S. D., & Sankar, R. (2013). A survey of intrusion detection systems in wireless sensor network. IEEE Communications Surveys & Tutorials, 16(1), 266–282.CrossRef Butun, I., Morgera, S. D., & Sankar, R. (2013). A survey of intrusion detection systems in wireless sensor network. IEEE Communications Surveys & Tutorials, 16(1), 266–282.CrossRef
5.
go back to reference Gupta, N., & Singh, S. N. (2016). Wormhole attacks in MANET. In 2016 6th international conference—cloud system and big data engineering (confluence), pp. 236–239. Gupta, N., & Singh, S. N. (2016). Wormhole attacks in MANET. In 2016 6th international conference—cloud system and big data engineering (confluence), pp. 236–239.
6.
go back to reference Karthik Raju, V., & Vinay Kumar, K. (2012). A simple and efficient mechanism to detect and avoid wormhole attacke in mobile ad hoc networks. In International conference on computing sciences, pp. 271–275, IEEE. Karthik Raju, V., & Vinay Kumar, K. (2012). A simple and efficient mechanism to detect and avoid wormhole attacke in mobile ad hoc networks. In International conference on computing sciences, pp. 271–275, IEEE.
7.
go back to reference Feroz, et al. (2019). A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT. SN Applied Sciences, 1(12), 1–7. Feroz, et al. (2019). A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT. SN Applied Sciences, 1(12), 1–7.
8.
go back to reference Feroz, et al. (2021). AHKM: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT. Egyptian Informatics Journal, 22(2), 119–124.CrossRef Feroz, et al. (2021). AHKM: An improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in IoT. Egyptian Informatics Journal, 22(2), 119–124.CrossRef
9.
go back to reference Feroz, et al. (2021). A multi-layer security approach for DDoS detection in internet of things. International Journal of Intelligent Unmanned Systems, 9(3), 178–191.CrossRef Feroz, et al. (2021). A multi-layer security approach for DDoS detection in internet of things. International Journal of Intelligent Unmanned Systems, 9(3), 178–191.CrossRef
10.
go back to reference Kalia, N., & Sharma, H. (2016). Detection of multiple blackhole nodes attack in MANET by modifying AODV protocol. International Journal on Computer Science and Engineering, 8(5), 160–174. Kalia, N., & Sharma, H. (2016). Detection of multiple blackhole nodes attack in MANET by modifying AODV protocol. International Journal on Computer Science and Engineering, 8(5), 160–174.
11.
go back to reference Sathya, M., & Priyadharshini, M. (2016). Detection and removal of blackhole attack in mobile ad-hoc networks using cooperative bait detection method scheme. International Journal of Scientific & Engineering Research, 7(3), 81–85. Sathya, M., & Priyadharshini, M. (2016). Detection and removal of blackhole attack in mobile ad-hoc networks using cooperative bait detection method scheme. International Journal of Scientific & Engineering Research, 7(3), 81–85.
12.
go back to reference Dhende, S., Musale, S., Shirbahadurkar, S., & Najan, A. (2017). SAODV: blackhole and grayhole attack detection protocol in MANETs. In Proceedings of the 2017 international conference on wireless communications, signal processing and networking (WiSPNET), pp. 2391–2394, Chennai, India. Dhende, S., Musale, S., Shirbahadurkar, S., & Najan, A. (2017). SAODV: blackhole and grayhole attack detection protocol in MANETs. In Proceedings of the 2017 international conference on wireless communications, signal processing and networking (WiSPNET), pp. 2391–2394, Chennai, India.
13.
go back to reference Arora, S. K., Vijan, S., & Gaba, G. S. (2016). Detection and analysis of blackhole attack using IDS. Indian Journal of Science and Technology, 9(20), 1–5.CrossRef Arora, S. K., Vijan, S., & Gaba, G. S. (2016). Detection and analysis of blackhole attack using IDS. Indian Journal of Science and Technology, 9(20), 1–5.CrossRef
14.
go back to reference Jain, A., Prajapati, U., & Chouhan, P. (2016). Trust based mechanism with AODV protocol for prevention of black-hole attack in MANET scenario. In Proceedings of the 2016 Symposium on Colossal Data Analysis and Networking, CDAN 2016, Indore, India. Jain, A., Prajapati, U., & Chouhan, P. (2016). Trust based mechanism with AODV protocol for prevention of black-hole attack in MANET scenario. In Proceedings of the 2016 Symposium on Colossal Data Analysis and Networking, CDAN 2016, Indore, India.
15.
go back to reference Alani, M. M. (2014). MANET security: A survey. In: Proceedings of the 2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE), pp. 559–564, Penang, Malaysia. Alani, M. M. (2014). MANET security: A survey. In: Proceedings of the 2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE), pp. 559–564, Penang, Malaysia.
16.
go back to reference Prashar, L., & Kapur, R. K. (2016). Performance analysis of routing protocols under different types of attacks in MANETs. In Proceedings of the 5th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2016, pp. 405–408, Noida, India Prashar, L., & Kapur, R. K. (2016). Performance analysis of routing protocols under different types of attacks in MANETs. In Proceedings of the 5th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2016, pp. 405–408, Noida, India
17.
go back to reference Chung, Y., Choi, S., & Won, D. (2013). Lightweight anonymous authentication scheme with unlinkability in global mobility networks. Journal of Convergence, 4, 23–29. Chung, Y., Choi, S., & Won, D. (2013). Lightweight anonymous authentication scheme with unlinkability in global mobility networks. Journal of Convergence, 4, 23–29.
18.
go back to reference Joshi, A. (2016). A review paper on blackhole attack in MANET. International Journal of Advance Research in Computer Science and Management Studies, 4(5), 16–21. Joshi, A. (2016). A review paper on blackhole attack in MANET. International Journal of Advance Research in Computer Science and Management Studies, 4(5), 16–21.
21.
go back to reference Prashar, L., & Kapur, R. K. (2016). Performance analysis of routing protocols under different types of attacks in MANETs. In Proceedings of the 5th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2016, pp. 405–408, Noida, India. Prashar, L., & Kapur, R. K. (2016). Performance analysis of routing protocols under different types of attacks in MANETs. In Proceedings of the 5th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2016, pp. 405–408, Noida, India.
22.
go back to reference Moudni, H., Er-Rouidi, M., Mouncif, H., & El Hadadi, B. (2016). Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. In Proceedings of the 2nd International Conference on Electrical and Information Technologies, ICEIT 2016, pp. 536–542, Tangiers, Morocco. Moudni, H., Er-Rouidi, M., Mouncif, H., & El Hadadi, B. (2016). Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. In Proceedings of the 2nd International Conference on Electrical and Information Technologies, ICEIT 2016, pp. 536–542, Tangiers, Morocco.
23.
go back to reference Gupta, S., Kar, S., & Dharmaraja, S. (2011). WHOP: Wormhole attack detection protocol using hound packet. In The International Conference on Innovations Technology, IEEE, pp. 226–231. Gupta, S., Kar, S., & Dharmaraja, S. (2011). WHOP: Wormhole attack detection protocol using hound packet. In The International Conference on Innovations Technology, IEEE, pp. 226–231.
24.
go back to reference Chiu, H. S., Lui, K. S. (2016). DELPHI, Wormhole detection mechanism for ad hoc wireless networks. In 1st International Symposium on Wireless Pervasive Computing, pp. 6–11. Chiu, H. S., Lui, K. S. (2016). DELPHI, Wormhole detection mechanism for ad hoc wireless networks. In 1st International Symposium on Wireless Pervasive Computing, pp. 6–11.
Metadata
Title
An Efficient Security Framework for Trusted and Secure Routing in MANET: A Comprehensive Solution
Publication date
06-01-2022
Published in
Wireless Personal Communications / Issue 1/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-09359-2

Other articles of this Issue 1/2022

Wireless Personal Communications 1/2022 Go to the issue