Skip to main content
Top
Published in: Wireless Personal Communications 3/2021

14-03-2021

Integrated Context-Based Mitigation Framework for Enforcing Security against Rendezvous Point Attack in MANETs

Authors: Sengathir Janakiraman, M. Deva Priya, A. Christy Jebamalar

Published in: Wireless Personal Communications | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Reliable communication in ad hoc networks necessitates mobile nodes to synchronize among themselves for cooperation. The cooperation in ad hoc networks is enforced through the implementation of encryption algorithms and intrusion detection systems. Most of the intrusion detection and encryption algorithms are not effective enough to address the extent to which a participative mobile node may trust other interacting mobile nodes for data forwarding. The existing mitigation frameworks consider packet forwarding capability as the single parameter for calculating trust values which cannot be appropriate for computing the accurate trust factor as reliable nodes are highly impacted by data rate, throughput, delay and energy consumption. An Integrated Context-based Mitigation Framework (ICMF) is proposed for facilitating effective mitigation of rendezvous point misbehavior and for enhancing the performance of the network. This proposed ICMF framework facilitates rendezvous point misbehavior detection by determining Grey theory Inspired Discriminating Factor (GTIDF) that is contextually derived from multiple factors including data rate, throughput, delay and energy consumptions using the benefits of the Grey theory. From the simulation results of the proposed ICMF framework, improved root node attackers survivability rate and root node attackers categorization rate are inferred when compared to the benchmarked baseline mitigation frameworks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Verma, A., & Khare, A. (2013). TFT Technique with Adaptive Thresholding for Selfish Attack Prevention in MANET. International Journal of Computer Applications, 63(16), 1–4.CrossRef Verma, A., & Khare, A. (2013). TFT Technique with Adaptive Thresholding for Selfish Attack Prevention in MANET. International Journal of Computer Applications, 63(16), 1–4.CrossRef
2.
go back to reference Lamba, G. K. (2016). Varying Number of Selfish Nodes based Simulation of AODV Routing Protocol in MANET using Reputation Based Scheme. International Journal Of Engineering And Computer Science, 1(2), 89–97.MathSciNet Lamba, G. K. (2016). Varying Number of Selfish Nodes based Simulation of AODV Routing Protocol in MANET using Reputation Based Scheme. International Journal Of Engineering And Computer Science, 1(2), 89–97.MathSciNet
3.
go back to reference Priya, M. D., Sengathir, J., & Valarmathi, M. L. (2010) Root node attack in a WiMAX 802.16e network. Trendz in Information Sciences & Computing(TISC2010), 1(1) 34–45. Priya, M. D., Sengathir, J., & Valarmathi, M. L. (2010) Root node attack in a WiMAX 802.16e network. Trendz in Information Sciences & Computing(TISC2010), 1(1) 34–45.
4.
go back to reference Sengathir, J., & Manoharan, R. (2013). Security Algorithms for Mitigating Selfish and Shared Root Node Attacks in MANETs. International Journal of Computer Network and Information Security, 5(10), 1–10.CrossRef Sengathir, J., & Manoharan, R. (2013). Security Algorithms for Mitigating Selfish and Shared Root Node Attacks in MANETs. International Journal of Computer Network and Information Security, 5(10), 1–10.CrossRef
5.
go back to reference Kariya, S. L., & Panchal, B. B. (2012). Selfish Nodes Detection in MANETs: Acknowledgement Based Approach. International Journal of Scientific Research, 2(5), 216–217.CrossRef Kariya, S. L., & Panchal, B. B. (2012). Selfish Nodes Detection in MANETs: Acknowledgement Based Approach. International Journal of Scientific Research, 2(5), 216–217.CrossRef
6.
go back to reference Rukhande, S., & Shete, P. (2015). Optimized Routing by Excluding Selfish Nodes for MANET. Communications on Applied Electronics, 3(5), 43–49.CrossRef Rukhande, S., & Shete, P. (2015). Optimized Routing by Excluding Selfish Nodes for MANET. Communications on Applied Electronics, 3(5), 43–49.CrossRef
7.
go back to reference Khoshabi Nobar, S., & Musevi Niya, J. (2014). Robust Mitigation of Selfish Misbehavior In Wireless Networks. Security and Communication Networks, 8(9), 1772–1779.CrossRef Khoshabi Nobar, S., & Musevi Niya, J. (2014). Robust Mitigation of Selfish Misbehavior In Wireless Networks. Security and Communication Networks, 8(9), 1772–1779.CrossRef
8.
go back to reference Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.CrossRef Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. H. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096–2114.CrossRef
9.
go back to reference Li, W., Joshi, A., & Finin, T. (2011). SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks. 2011-MILCOM 2011 Military Communications Conference, 1(1), 45–57. Li, W., Joshi, A., & Finin, T. (2011). SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks. 2011-MILCOM 2011 Military Communications Conference, 1(1), 45–57.
10.
go back to reference Li, P. P. (2016). Trust portfolio toward an integrative framework: the emerging themes of trust context and trust complexity. Journal of Trust Research, 6(2), 105–110.CrossRef Li, P. P. (2016). Trust portfolio toward an integrative framework: the emerging themes of trust context and trust complexity. Journal of Trust Research, 6(2), 105–110.CrossRef
11.
go back to reference Fung, C. J., & Zhu, Q. (2016). FACID: A trust-based collaborative decision framework for intrusion detection networks. Ad Hoc Networks, 53, 17–31.CrossRef Fung, C. J., & Zhu, Q. (2016). FACID: A trust-based collaborative decision framework for intrusion detection networks. Ad Hoc Networks, 53, 17–31.CrossRef
12.
go back to reference Guo, J., Marshall, A., & Zhou, B. (2017). A Multi-Parameter Trust Framework for Mobile Ad Hoc Networks. Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, 1(1), 245–277. Guo, J., Marshall, A., & Zhou, B. (2017). A Multi-Parameter Trust Framework for Mobile Ad Hoc Networks. Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, 1(1), 245–277.
13.
go back to reference Gopal, D. G., & Saravanan, R. (2016). Selfish node detection based on evidence by trust authority and selfish replica allocation in DANET. International Journal of Information and Communication Technology, 9(4), 473.CrossRef Gopal, D. G., & Saravanan, R. (2016). Selfish node detection based on evidence by trust authority and selfish replica allocation in DANET. International Journal of Information and Communication Technology, 9(4), 473.CrossRef
14.
go back to reference Sengathir, J., & Manoharan, R. (2013). A split half reliability coefficient based mathematical model for mitigating selfish nodes in MANETs. 2013 3rd IEEE International Advance Computing Conference (IACC), 2(1), 45–54. Sengathir, J., & Manoharan, R. (2013). A split half reliability coefficient based mathematical model for mitigating selfish nodes in MANETs. 2013 3rd IEEE International Advance Computing Conference (IACC), 2(1), 45–54.
15.
go back to reference Sengathir, J., & Manoharan, R. (2015). Exponential Reliability Coefficient based Reputation Mechanism for isolating selfish nodes in MANETs. Egyptian Informatics Journal, 16(2), 231–241.CrossRef Sengathir, J., & Manoharan, R. (2015). Exponential Reliability Coefficient based Reputation Mechanism for isolating selfish nodes in MANETs. Egyptian Informatics Journal, 16(2), 231–241.CrossRef
16.
go back to reference Sengathir, J., & Manoharan, R. (2016). An Erlang factor-based conditional reliability mechanism for enforcing co-operation in MANETs. Serbian Journal of Electrical Engineering, 13(2), 265–284.CrossRef Sengathir, J., & Manoharan, R. (2016). An Erlang factor-based conditional reliability mechanism for enforcing co-operation in MANETs. Serbian Journal of Electrical Engineering, 13(2), 265–284.CrossRef
17.
go back to reference Sengathir, J., & Manoharan, R. (2014). Laplace Stleltjes Transform based Conditional Survivability Coefficient Model for mitigating Selfish Nodes in MANETs. Egyptian Informatics Journal, 15(3), 149–157.CrossRef Sengathir, J., & Manoharan, R. (2014). Laplace Stleltjes Transform based Conditional Survivability Coefficient Model for mitigating Selfish Nodes in MANETs. Egyptian Informatics Journal, 15(3), 149–157.CrossRef
18.
go back to reference Sengathir, J., & Manoharan, R. (2015). A futuristic trust coefficient-based semi-Markov prediction model for mitigating selfish nodes in MANETs. EURASIP Journal on Wireless Communications and Networking, 2015(1), 1–13.CrossRef Sengathir, J., & Manoharan, R. (2015). A futuristic trust coefficient-based semi-Markov prediction model for mitigating selfish nodes in MANETs. EURASIP Journal on Wireless Communications and Networking, 2015(1), 1–13.CrossRef
19.
go back to reference Parthiban, S., & Rodrigues, P. (2016). A Hyper-Geometric Trust Factor Based Markov Prediction Mechanism for Compromised Rendezvous Point in MANET. Arabian Journal for Science and Engineering, 41(8), 3187–3199.CrossRef Parthiban, S., & Rodrigues, P. (2016). A Hyper-Geometric Trust Factor Based Markov Prediction Mechanism for Compromised Rendezvous Point in MANET. Arabian Journal for Science and Engineering, 41(8), 3187–3199.CrossRef
20.
go back to reference Yan, S., Liu, S., & Liu, X. (2016). Dynamic Grey Target Decision Making Method with Three-Parameter Grey Numbers. Grey Systems: Theory and Application, 6(2), 169–179.CrossRef Yan, S., Liu, S., & Liu, X. (2016). Dynamic Grey Target Decision Making Method with Three-Parameter Grey Numbers. Grey Systems: Theory and Application, 6(2), 169–179.CrossRef
21.
go back to reference Umar, R., & Mesbah, W. (2017). Throughput-Efficient Coalition Formation of Selfish/Altruistic Nodes in ad hoc Networks: A Hedonic Game Approach. Telecommunication Systems, 67(1), 95–111.CrossRef Umar, R., & Mesbah, W. (2017). Throughput-Efficient Coalition Formation of Selfish/Altruistic Nodes in ad hoc Networks: A Hedonic Game Approach. Telecommunication Systems, 67(1), 95–111.CrossRef
22.
go back to reference Chuang, Y., & Lee, Y. (2018). Defense Mechanism for Malicious and Selective Forwarding Attacks in Large and Mobile Wireless Networks. The Computer Journal, 1(1), 34–49. Chuang, Y., & Lee, Y. (2018). Defense Mechanism for Malicious and Selective Forwarding Attacks in Large and Mobile Wireless Networks. The Computer Journal, 1(1), 34–49.
23.
go back to reference Kumar, S., & Dutta, K. (2018). Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks. Wireless Personal Communications, 101(4), 2029–2052.CrossRef Kumar, S., & Dutta, K. (2018). Trust Based Intrusion Detection Technique to Detect Selfish Nodes in Mobile Ad Hoc Networks. Wireless Personal Communications, 101(4), 2029–2052.CrossRef
24.
go back to reference Waqas, A., & Mahmood, H. (2017). A Game Theoretical Approach for Topology Control in Wireless Ad Hoc Networks with Selfish Nodes. Wireless Personal Communications, 96(1), 249–263.MathSciNetCrossRef Waqas, A., & Mahmood, H. (2017). A Game Theoretical Approach for Topology Control in Wireless Ad Hoc Networks with Selfish Nodes. Wireless Personal Communications, 96(1), 249–263.MathSciNetCrossRef
25.
go back to reference Roles, A., & ElAarag, H. (2017). Coexistence with malicious and selfish nodes in wireless ad hoc networks: A Bayesian game approach. Journal of Algorithms & Computational Technology, 11(4), 353–365.MathSciNetCrossRef Roles, A., & ElAarag, H. (2017). Coexistence with malicious and selfish nodes in wireless ad hoc networks: A Bayesian game approach. Journal of Algorithms & Computational Technology, 11(4), 353–365.MathSciNetCrossRef
26.
go back to reference Mohamed Musthafa, M., Vanıtha, K., Zubaır Rahman, A. M. J. M. and Anıtha, K. (2020) "An Efficient Approach to Identify Selfish Node in MANET," 2020 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 2020, pp. 1–3 Mohamed Musthafa, M., Vanıtha, K., Zubaır Rahman, A. M. J. M. and Anıtha, K. (2020) "An Efficient Approach to Identify Selfish Node in MANET," 2020 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 2020, pp. 1–3
27.
go back to reference Jim, L. E., and Gregory, M. A. (2019). "Improvised MANET Selfish Node Detection using Artificial Immune System based Decision Tree," 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), Auckland, New Zealand, pp. 1-6 Jim, L. E., and Gregory, M. A. (2019). "Improvised MANET Selfish Node Detection using Artificial Immune System based Decision Tree," 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), Auckland, New Zealand, pp. 1-6
28.
go back to reference Mao, Y., Zhou, C., Qi, J., et al. (2020). A Fair Credit-based Incentive Mechanism for Routing in DTN-based Sensor Network with Nodes’ Selfishness. Journal on Wireless Communication and Networking, 2020, 232.CrossRef Mao, Y., Zhou, C., Qi, J., et al. (2020). A Fair Credit-based Incentive Mechanism for Routing in DTN-based Sensor Network with Nodes’ Selfishness. Journal on Wireless Communication and Networking, 2020, 232.CrossRef
29.
go back to reference Janakiraman, S., & Jayasingh, B. B. (2019). A Hyper-Exponential Factor-Based Semi-Markov Prediction Mechanism for Selfish Rendezvous Nodes in MANETs. Wireless Personal Communications, 108, 1493–1511.CrossRef Janakiraman, S., & Jayasingh, B. B. (2019). A Hyper-Exponential Factor-Based Semi-Markov Prediction Mechanism for Selfish Rendezvous Nodes in MANETs. Wireless Personal Communications, 108, 1493–1511.CrossRef
30.
go back to reference Roy, A., Acharya, T., & Das Bit, S. (2020). Social-based reputation-aware data forwarding for improved multicast delivery in the presence of selfish nodes in DTNs. International Journal of Communication Systems, 33, e4235.CrossRef Roy, A., Acharya, T., & Das Bit, S. (2020). Social-based reputation-aware data forwarding for improved multicast delivery in the presence of selfish nodes in DTNs. International Journal of Communication Systems, 33, e4235.CrossRef
Metadata
Title
Integrated Context-Based Mitigation Framework for Enforcing Security against Rendezvous Point Attack in MANETs
Authors
Sengathir Janakiraman
M. Deva Priya
A. Christy Jebamalar
Publication date
14-03-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08323-4

Other articles of this Issue 3/2021

Wireless Personal Communications 3/2021 Go to the issue