Skip to main content
Top
Published in: Wireless Personal Communications 4/2022

10-11-2021

Eliminating Selective Dropping Attack in Mobile Ad Hoc Network

Authors: Mahdi Bounouni, Louiza Bouallouche-Medjkoune, Abderrahmane Beraza, Adel Daoud

Published in: Wireless Personal Communications | Issue 4/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we propose a new reputation approach, called I-WD (improved WatchDog). We attempt to eliminate selective dropping attack that ensue when malicious nodes drop packets at low rates to damage the network without been detected. The proposed approach is structured around four modules. The monitoring module overhears the forwarding activities of neighboring nodes using the promiscuous mode. The reputation module evaluates the nodes reputation values. We have proposed a new reputation method that enables nodes to evaluate their neighbors in multiple monitoring sessions. Thus, the computed reputation value is used to determine the increment and decrement reputation rate. The exclusion module is accountable for excluding nodes with reputation values below the reputation threshold. The route selection module make restriction about discovered forwarding routes. Only forwarding routes that satisfy the route incorporation threshold are accepted. The simulation results demonstrate that I-WD improves the success rate and reduces the number of packets dropped by malicious nodes, while increases the end-to-end delay.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Thangaraj, K., & Dharma, D. (2020). Optimized Fuzzy System Dependent Trust Score for Mobile AdHoc Network. Wireless Personal Communications 1–15. Thangaraj, K., & Dharma, D. (2020). Optimized Fuzzy System Dependent Trust Score for Mobile AdHoc Network. Wireless Personal Communications 1–15.
2.
go back to reference Nabou, A., Laanaoui, M. D., & Ouzzif, M. (2020). New MPR Computation for Securing OLSR Routing Protocol Against Single Black Hole Attack. Wireless Personal Communications, 1–20. Nabou, A., Laanaoui, M. D., & Ouzzif, M. (2020). New MPR Computation for Securing OLSR Routing Protocol Against Single Black Hole Attack. Wireless Personal Communications, 1–20.
3.
go back to reference Bounouni, M., & Bouallouche-Medjkoune, L. (2018). Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network. The Journal of Supercomputing, 74(10), 5373–5398.CrossRef Bounouni, M., & Bouallouche-Medjkoune, L. (2018). Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network. The Journal of Supercomputing, 74(10), 5373–5398.CrossRef
4.
go back to reference Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000, August). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255-265). Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000, August). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255-265).
5.
go back to reference Durga Devi, S., & Rukmani Devi, D. (2021). Malicious node and malicious observer node detection system in MANETs. Concurrency and Computation: Practice and Experience, 33(3), 5241.CrossRef Durga Devi, S., & Rukmani Devi, D. (2021). Malicious node and malicious observer node detection system in MANETs. Concurrency and Computation: Practice and Experience, 33(3), 5241.CrossRef
6.
go back to reference Zhang, S. S., Wang, S. W., Xia, H., & Cheng, X. G. (2019). An attack-resistant reputation management system for mobile ad hoc networks. Procedia Computer Science, 147, 473–479.CrossRef Zhang, S. S., Wang, S. W., Xia, H., & Cheng, X. G. (2019). An attack-resistant reputation management system for mobile ad hoc networks. Procedia Computer Science, 147, 473–479.CrossRef
7.
go back to reference Saifuddin, K. M., Ali, A. J. B., Ahmed, A. S., Alam, S. S., & Ahmad, A. S. (2018, September). Watchdog and Pathrater based intrusion detection system for MANET. In 2018 4th International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT) (pp. 168-173). Saifuddin, K. M., Ali, A. J. B., Ahmed, A. S., Alam, S. S., & Ahmad, A. S. (2018, September). Watchdog and Pathrater based intrusion detection system for MANET. In 2018 4th International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT) (pp. 168-173).
8.
go back to reference Thiagarajan, R., Babu, M. R., & Moorthi, M. (2021). Quality of Service based Ad hoc On-demand Multipath Distance Vector Routing protocol in mobile ad hoc network. Journal of Ambient Intelligence and Humanized Computing, 12(5), 4957–4965.CrossRef Thiagarajan, R., Babu, M. R., & Moorthi, M. (2021). Quality of Service based Ad hoc On-demand Multipath Distance Vector Routing protocol in mobile ad hoc network. Journal of Ambient Intelligence and Humanized Computing, 12(5), 4957–4965.CrossRef
9.
10.
go back to reference Buchegger, S., & Le Boudec, J. Y. (2002, June). Performance analysis of the CONFIDANT protocol. In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing (pp. 226-236). Buchegger, S., & Le Boudec, J. Y. (2002, June). Performance analysis of the CONFIDANT protocol. In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing (pp. 226-236).
11.
go back to reference Michiardi, P., & Molva, R. (2002). Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced communications and multimedia security (pp. 107-121). Springer, Boston, MA. Michiardi, P., & Molva, R. (2002). Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced communications and multimedia security (pp. 107-121). Springer, Boston, MA.
12.
go back to reference Channa, M. I., & Ahmed, K. M. (2011). A reliable routing scheme for post-disaster ad hoc communication networks. JCM, 6(7), 549–557.CrossRef Channa, M. I., & Ahmed, K. M. (2011). A reliable routing scheme for post-disaster ad hoc communication networks. JCM, 6(7), 549–557.CrossRef
13.
go back to reference Ahmed, A., Bakar, K. A., Channa, M. I., Haseeb, K., & Khan, A. W. (2016). A trust aware routing protocol for energy constrained wireless sensor network. Telecommunication Systems, 61(1), 123–140.CrossRef Ahmed, A., Bakar, K. A., Channa, M. I., Haseeb, K., & Khan, A. W. (2016). A trust aware routing protocol for energy constrained wireless sensor network. Telecommunication Systems, 61(1), 123–140.CrossRef
14.
go back to reference Ahmed, A., Kumar, P., Bhangwar, A. R., & Channa, M. I. (2016, December). A secure and QoS aware routing protocol for Wireless Sensor Network. In 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 313-317). IEEE. Ahmed, A., Kumar, P., Bhangwar, A. R., & Channa, M. I. (2016, December). A secure and QoS aware routing protocol for Wireless Sensor Network. In 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) (pp. 313-317). IEEE.
15.
go back to reference Sharma, R., & Gupta, D. V. (2018, January). A Reputation-Based Mechanism to Detect Selfish Nodes in DTNs. In International Conference on Communications and Cyber Physical Engineering 2018 (pp. 55-61). Springer, Singapore. Sharma, R., & Gupta, D. V. (2018, January). A Reputation-Based Mechanism to Detect Selfish Nodes in DTNs. In International Conference on Communications and Cyber Physical Engineering 2018 (pp. 55-61). Springer, Singapore.
16.
go back to reference Manikandan, R., & Mangayarkarasi, R. (2019). Evaluation to Perform a Scattered for Detecting Selfish Nodes in MANET using Collabrative Watchdog Algorithm. International Journal of Computer Sciences and Engineering, 7(6), 788–792.CrossRef Manikandan, R., & Mangayarkarasi, R. (2019). Evaluation to Perform a Scattered for Detecting Selfish Nodes in MANET using Collabrative Watchdog Algorithm. International Journal of Computer Sciences and Engineering, 7(6), 788–792.CrossRef
17.
go back to reference Ragunathan, R., & Vadivel, R. (2018). Cocowa model: Watchdog mechanism used to propagate selfish nodes in cellular networks of moving vehicles. International Journal of Advanced Research in Computer Science, 9(2) Ragunathan, R., & Vadivel, R. (2018). Cocowa model: Watchdog mechanism used to propagate selfish nodes in cellular networks of moving vehicles. International Journal of Advanced Research in Computer Science, 9(2)
18.
go back to reference Preetha, M., & Sugitha, S. (2016, February). Identifying selfish nodes using mutual neighbor based watchdog mechanism for DTN. In 2016 International Conference on Information Communication and Embedded Systems (ICICES) (pp. 1-5). IEEE. Preetha, M., & Sugitha, S. (2016, February). Identifying selfish nodes using mutual neighbor based watchdog mechanism for DTN. In 2016 International Conference on Information Communication and Embedded Systems (ICICES) (pp. 1-5). IEEE.
19.
go back to reference Hernandez-Orallo, E., Olmos, M. D. S., Cano, J. C., Calafate, C. T., & Manzoni, P. (2014). CoCoWa: A collaborative contact-based watchdog for detecting selfish nodes. IEEE transactions on mobile computing, 14(6), 1162–1175.CrossRef Hernandez-Orallo, E., Olmos, M. D. S., Cano, J. C., Calafate, C. T., & Manzoni, P. (2014). CoCoWa: A collaborative contact-based watchdog for detecting selfish nodes. IEEE transactions on mobile computing, 14(6), 1162–1175.CrossRef
20.
go back to reference Hernandez-Orallo, E., Serrat, M. D., Cano, J. C., Calafate, C. T., & Manzoni, P. (2012). Improving selfish node detection in MANETs using a collaborative watchdog. IEEE Communications Letters, 16(5), 642–645.CrossRef Hernandez-Orallo, E., Serrat, M. D., Cano, J. C., Calafate, C. T., & Manzoni, P. (2012). Improving selfish node detection in MANETs using a collaborative watchdog. IEEE Communications Letters, 16(5), 642–645.CrossRef
21.
22.
go back to reference Lal, N., Kumar, S., Saxena, A., & Chaurasiya, V. K. (2015). Detection of malicious node behaviour via I-watchdog protocol in mobile Ad Hoc network with DSDV routing scheme. Procedia Computer Science, 49, 264–273.CrossRef Lal, N., Kumar, S., Saxena, A., & Chaurasiya, V. K. (2015). Detection of malicious node behaviour via I-watchdog protocol in mobile Ad Hoc network with DSDV routing scheme. Procedia Computer Science, 49, 264–273.CrossRef
23.
go back to reference Kollati, V. K. (2017). IBFWA: Integrated Bloom Filter in Watchdog Algorithm for hybrid black hole attack detection in MANET. Information Security Journal: A Global Perspective, 26(1), 49–60. Kollati, V. K. (2017). IBFWA: Integrated Bloom Filter in Watchdog Algorithm for hybrid black hole attack detection in MANET. Information Security Journal: A Global Perspective, 26(1), 49–60.
24.
go back to reference Kumar, S., & Dutta, K. (2018). Trust based intrusion detection technique to detect selfish nodes in mobile ad hoc networks. Wireless Personal Communications, 101(4), 2029–2052.CrossRef Kumar, S., & Dutta, K. (2018). Trust based intrusion detection technique to detect selfish nodes in mobile ad hoc networks. Wireless Personal Communications, 101(4), 2029–2052.CrossRef
25.
go back to reference Derhab, A., Bouras, A., Belaoued, M., Maglaras, L., & Khan, F. A. (2020). Two-hop monitoring mechanism based on relaxed flow conservation constraints against selective routing attacks in wireless sensor networks. Sensors, 20(21), 6106.CrossRef Derhab, A., Bouras, A., Belaoued, M., Maglaras, L., & Khan, F. A. (2020). Two-hop monitoring mechanism based on relaxed flow conservation constraints against selective routing attacks in wireless sensor networks. Sensors, 20(21), 6106.CrossRef
26.
go back to reference Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing (pp. 153-181). Springer, Boston, MA. Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. In Mobile computing (pp. 153-181). Springer, Boston, MA.
Metadata
Title
Eliminating Selective Dropping Attack in Mobile Ad Hoc Network
Authors
Mahdi Bounouni
Louiza Bouallouche-Medjkoune
Abderrahmane Beraza
Adel Daoud
Publication date
10-11-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-09289-z

Other articles of this Issue 4/2022

Wireless Personal Communications 4/2022 Go to the issue