Skip to main content
Top

2024 | OriginalPaper | Chapter

Detection of Wormhole Attacks Using the DCNNBiLSTM Model to Secure the MANET

Authors : B. Rajalakshmi, R. J. Anandhi, K. Moorthi, Balasubramanian Prabhu Kavin, Rajesh Kumar Dhanaraj

Published in: Proceedings of Third International Conference on Computing and Communication Networks

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The obvious response to an anytime, anywhere network in the current era of heterogeneous networks is MANET. It is a collection of wirelessly communicative mobile gadgets that operate on their own. In order to stop the damage that rogue network nodes could do, security in MANET is a crucial duty. A category of denial-of-service (DoS) assault, the wormhole attack bombards the network with numerous phoney packets and messages in an effort to exhaust its resources. Wormhole attacks are a particular type of network layer attack that imitates routing algorithms. Because of deep learning's exceptional performance in many detection and identification tasks, this research presents an approach for intelligent and effective attack detection in MANET. Our goal is to mimic a wormhole attack in a network environment with many wormhole tunnels. The CNN layer is used by the DCNNBiLSTM architecture to extract features from input data, and BiLSTMs are used to predict sequences. Five performance indicators were used to compare CNN, LSTM and DCNNBiLSTM under wormhole attack.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Tahboush, M., Agoyi, M.: A hybrid wormhole attack detection in mobile ad-hoc network (MANET). IEEE Access 9, 11872–11883 (2021)CrossRef Tahboush, M., Agoyi, M.: A hybrid wormhole attack detection in mobile ad-hoc network (MANET). IEEE Access 9, 11872–11883 (2021)CrossRef
2.
go back to reference Gupta, N., Singh, S.N.: Wormhole attacks in MANET. In: 2016 6th International Conference-Cloud System and Big Data Engineering (Confluence), pp. 236–239. IEEE (2016) Gupta, N., Singh, S.N.: Wormhole attacks in MANET. In: 2016 6th International Conference-Cloud System and Big Data Engineering (Confluence), pp. 236–239. IEEE (2016)
3.
go back to reference Biswas, J., Gupta, A., Singh, D.: WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol. In: 2014 9th International Conference on Industrial and Information Systems (ICIIS), pp. 1–6. IEEE (2014) Biswas, J., Gupta, A., Singh, D.: WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol. In: 2014 9th International Conference on Industrial and Information Systems (ICIIS), pp. 1–6. IEEE (2014)
4.
go back to reference Singh, Y., Khatkar, A., Rani, P., Barak, D.D.: Wormhole attack avoidance technique in mobile adhoc networks. In: 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT), pp. 283–287. IEEE (2013) Singh, Y., Khatkar, A., Rani, P., Barak, D.D.: Wormhole attack avoidance technique in mobile adhoc networks. In: 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT), pp. 283–287. IEEE (2013)
5.
go back to reference Anju, J., Sminesh, C.N.: An improved clustering-based approach for wormhole attack detection in MANET. In: 2014 3rd International Conference on Eco-friendly Computing and Communication Systems, pp. 149–154. IEEE (2014) Anju, J., Sminesh, C.N.: An improved clustering-based approach for wormhole attack detection in MANET. In: 2014 3rd International Conference on Eco-friendly Computing and Communication Systems, pp. 149–154. IEEE (2014)
6.
go back to reference Shin, S.Y., Halim, E.H.: Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation. In: 2012 International Conference on ICT Convergence (ICTC), pp. 781–786. IEEE (2012) Shin, S.Y., Halim, E.H.: Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation. In: 2012 International Conference on ICT Convergence (ICTC), pp. 781–786. IEEE (2012)
7.
go back to reference Imran, M., Khan, F.A., Jamal, T., Durad, M.H.: Analysis of detection features for wormhole attacks in MANETs. Procedia Comput. Sci. 56, 384–390 (2015)CrossRef Imran, M., Khan, F.A., Jamal, T., Durad, M.H.: Analysis of detection features for wormhole attacks in MANETs. Procedia Comput. Sci. 56, 384–390 (2015)CrossRef
8.
go back to reference Jamali, S., Fotohi, R.: Defending against wormhole attack in MANET using an artificial immune system. New Rev. Inform. Netw. 21(2), 79–100 (2016)CrossRef Jamali, S., Fotohi, R.: Defending against wormhole attack in MANET using an artificial immune system. New Rev. Inform. Netw. 21(2), 79–100 (2016)CrossRef
9.
go back to reference Rmayti, M., Begriche, Y., Khatoun, R., Khoukhi, L., Mammeri, A.: Graph-based wormhole attack detection in mobile ad hoc networks (MANETs). In: 2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ), pp. 1–6. IEEE (2018) Rmayti, M., Begriche, Y., Khatoun, R., Khoukhi, L., Mammeri, A.: Graph-based wormhole attack detection in mobile ad hoc networks (MANETs). In: 2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ), pp. 1–6. IEEE (2018)
10.
go back to reference Jamali, S., Fotohi, R.: DAWA: Ddfending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. J. Supercomput. 73(12), 5173–5196 (2017) Jamali, S., Fotohi, R.: DAWA: Ddfending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. J. Supercomput. 73(12), 5173–5196 (2017)
11.
go back to reference Alam, M.R., Chan, K.S.: RTT-TC: a topological comparison based method to detect wormhole attacks in MANET. In: 2010 IEEE 12th International Conference on Communication Technology, pp. 991–994. IEEE (2010) Alam, M.R., Chan, K.S.: RTT-TC: a topological comparison based method to detect wormhole attacks in MANET. In: 2010 IEEE 12th International Conference on Communication Technology, pp. 991–994. IEEE (2010)
12.
go back to reference Bashir, M., Tahir, S., Almufareh, M.F., Hamid, B., Qamar, F.: Wormhole attack detection technques in MANET. In: 2023 International Conference on Business Analytics for Technology and Security (ICBATS), pp. 1–7. IEEE (2023) Bashir, M., Tahir, S., Almufareh, M.F., Hamid, B., Qamar, F.: Wormhole attack detection technques in MANET. In: 2023 International Conference on Business Analytics for Technology and Security (ICBATS), pp. 1–7. IEEE (2023)
13.
go back to reference Gorlatova, M.A., Mason, P.C., Wang, M., Lamont, L., Liscano, R.: Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis. In: MILCOM 2006–2006 IEEE Military Communications Conference, pp. 1–7. IEEE (2006) Gorlatova, M.A., Mason, P.C., Wang, M., Lamont, L., Liscano, R.: Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis. In: MILCOM 2006–2006 IEEE Military Communications Conference, pp. 1–7. IEEE (2006)
14.
go back to reference Nouri, M., Aghdam, S.A., Aghdam, S.A.: Collaborative techniques for detecting wormhole attack in MANETs. In: 2011 International Conference on Research and Innovation in Information Systems, pp. 1–6. IEEE (2011) Nouri, M., Aghdam, S.A., Aghdam, S.A.: Collaborative techniques for detecting wormhole attack in MANETs. In: 2011 International Conference on Research and Innovation in Information Systems, pp. 1–6. IEEE (2011)
15.
go back to reference Diro, A.A., Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for Internet of Things. Futur. Gener. Comput. Syst. 82, 761–768 (2018)CrossRef Diro, A.A., Chilamkurti, N.: Distributed attack detection scheme using deep learning approach for Internet of Things. Futur. Gener. Comput. Syst. 82, 761–768 (2018)CrossRef
16.
go back to reference Sriram, S., Vinayakumar, R., Alazab, M., Soman, K.P.: Network flow based IoT botnet attack detection using deep learning. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 189–194. IEEE (2020) Sriram, S., Vinayakumar, R., Alazab, M., Soman, K.P.: Network flow based IoT botnet attack detection using deep learning. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 189–194. IEEE (2020)
17.
go back to reference Rathod, I., Saxena, A.: Remapping attack detection and prevention for reliable data service in MANET (2023) Rathod, I., Saxena, A.: Remapping attack detection and prevention for reliable data service in MANET (2023)
18.
go back to reference Rajkumar, K., Mercy Shalinie, S.: Boomerang packet testing to mitigate wormhole attack in MANET (2023) Rajkumar, K., Mercy Shalinie, S.: Boomerang packet testing to mitigate wormhole attack in MANET (2023)
19.
go back to reference Bhatti, D.S., Saleem, S., Imran, A., Kim, H., Kim, K.I.: DAIWN: detection and isolation of wormhole nodes in wireless ad hoc networks (2023) Bhatti, D.S., Saleem, S., Imran, A., Kim, H., Kim, K.I.: DAIWN: detection and isolation of wormhole nodes in wireless ad hoc networks (2023)
20.
go back to reference Ninu, S.B.: An intrusion detection system using exponential henry gas solubility optimization based deep neuro fuzzy network in MANET. Eng. Appl. Artif. Intell. 123, 105969 (2023)CrossRef Ninu, S.B.: An intrusion detection system using exponential henry gas solubility optimization based deep neuro fuzzy network in MANET. Eng. Appl. Artif. Intell. 123, 105969 (2023)CrossRef
21.
go back to reference Abbood, Z.A., Atilla, D.Ç., Aydin, Ç.: Intrusion detection system through deep learning in routing MANET networks. Intell. Autom. Soft Comput. 37(1) (2023) Abbood, Z.A., Atilla, D.Ç., Aydin, Ç.: Intrusion detection system through deep learning in routing MANET networks. Intell. Autom. Soft Comput. 37(1) (2023)
22.
go back to reference Singh, C.E., Vigila, S.M.C.: An investigation of machine learning-based intrusion detection system in mobile ad hoc network. Int. J. Intell. Eng. Inform. 11(1), 54–70 (2023) Singh, C.E., Vigila, S.M.C.: An investigation of machine learning-based intrusion detection system in mobile ad hoc network. Int. J. Intell. Eng. Inform. 11(1), 54–70 (2023)
23.
go back to reference Edwin Singh, C., Celestin Vigila, S.M.: WOA-DNN for intelligent intrusion detection and classification in MANET services. Intell. Autom. Soft Comput. 35(2) (2023) Edwin Singh, C., Celestin Vigila, S.M.: WOA-DNN for intelligent intrusion detection and classification in MANET services. Intell. Autom. Soft Comput. 35(2) (2023)
24.
go back to reference Vijayan, P., Anbalagan, P., Selvakumar, S.: An ensembled optimization algorithm for secured and energy efficient low latency MANET with intrusion detection (2023) Vijayan, P., Anbalagan, P., Selvakumar, S.: An ensembled optimization algorithm for secured and energy efficient low latency MANET with intrusion detection (2023)
Metadata
Title
Detection of Wormhole Attacks Using the DCNNBiLSTM Model to Secure the MANET
Authors
B. Rajalakshmi
R. J. Anandhi
K. Moorthi
Balasubramanian Prabhu Kavin
Rajesh Kumar Dhanaraj
Copyright Year
2024
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0892-5_2