Skip to main content
Erschienen in: Wireless Personal Communications 1/2023

16.09.2022

FSSAM: A Five Stage Security Analysis Model for Detecting and Preventing Wormhole Attack in Mobile Ad-Hoc Networks Using Adaptive Atom Search Algorithm

verfasst von: D. Hemanand, N. Sankar Ram, D. S. Jayalakshmi

Erschienen in: Wireless Personal Communications | Ausgabe 1/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile Ad-hoc Network is a decentralized wireless network which is drastically growing day by day. It can be vulnerable to several threats and attacks, namely wormhole attacks, due to some characteristics, such as node, location, time etc.; hence it leads to loss of data, route failure, and data route diversion. Moreover, several existing approaches have been introduced to resolve the wormhole attack, yet suffering from higher consumed energy, high delay in packet delivery and less throughput. A Five Stage Security Analysis Model is developed to effectively detect and prevent the wormhole attack by considering these problems. The five-stage model investigates the information like route, node location, time, hop count and neighbour analysis in the network. The proposed model cannot need any middleware or some special type of hardware, and also it minimizes the energy and delay by keeping away from executing wormhole detection for every node present in the network. The Network Simulator-2 software is used to provide the simulation of the proposed model FSSAM. The performance is evaluated, and simulation results are verified in terms of throughput, delay, energy, packet loss, end-to-end delay and packet delivery ratio. The determined outcomes have proved that the proposed model performed better for wormhole detection and prevention than existing approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Tahboush, M., & Agoyi, M. (2021). A hybrid wormhole attack detection in mobile ad-hoc network (MANET). IEEE Access, 9, 11872–11883.CrossRef Tahboush, M., & Agoyi, M. (2021). A hybrid wormhole attack detection in mobile ad-hoc network (MANET). IEEE Access, 9, 11872–11883.CrossRef
2.
Zurück zum Zitat Liu, G., Yan, Z., & Pedrycz, W. (2018). Data collection for attack detection and security measurement in mobile ad hoc networks: A survey. Journal of Network and Computer Applications, 105, 105–122.CrossRef Liu, G., Yan, Z., & Pedrycz, W. (2018). Data collection for attack detection and security measurement in mobile ad hoc networks: A survey. Journal of Network and Computer Applications, 105, 105–122.CrossRef
3.
Zurück zum Zitat Quy, V. K., Ban, N. T., Nam, V. H., Tuan, D. M., & Han, N. D. (2019). Survey of recent routing metrics and protocols for mobile ad-hoc networks. The Journal of Communication, 14(2), 110–120.CrossRef Quy, V. K., Ban, N. T., Nam, V. H., Tuan, D. M., & Han, N. D. (2019). Survey of recent routing metrics and protocols for mobile ad-hoc networks. The Journal of Communication, 14(2), 110–120.CrossRef
4.
Zurück zum Zitat Majumder, S., & Bhattacharyya, D. (2018). Mitigating wormhole attack in MANET using absolute deviation statistical approach. In Proceedings of the IEEE 8th annual computer communication workshop conference. (CCWC), Las Vegas (pp. 317–320). Majumder, S., & Bhattacharyya, D. (2018). Mitigating wormhole attack in MANET using absolute deviation statistical approach. In Proceedings of the IEEE 8th annual computer communication workshop conference. (CCWC), Las Vegas (pp. 317–320).
5.
Zurück zum Zitat Ali, S., Nand, P., & Tiwari, S. (2022). Detection of wormhole attack in vehicular ad-hoc network over real map using machine learning approach with preventive scheme. Journal of Information Technology Management, 14(Security and Resource Management challenges for Internet of Things), 159–179. Ali, S., Nand, P., & Tiwari, S. (2022). Detection of wormhole attack in vehicular ad-hoc network over real map using machine learning approach with preventive scheme. Journal of Information Technology Management, 14(Security and Resource Management challenges for Internet of Things), 159–179.
6.
Zurück zum Zitat Abdan, M., & Seno, S. A. H. (2022). Machine learning methods for intrusive detection of wormhole attack in mobile ad-hoc network (MANET). Abdan, M., & Seno, S. A. H. (2022). Machine learning methods for intrusive detection of wormhole attack in mobile ad-hoc network (MANET).
7.
Zurück zum Zitat Alenezi, F. A., Song, S., & Choi, B. Y. (2021). SWANS: SDN-based Wormhole Analysis using the neighbor similarity for a mobile ad hoc network (MANET). In 2021 IFIP/IEEE international symposium on integrated network management (IM) (pp. 653–657). Alenezi, F. A., Song, S., & Choi, B. Y. (2021). SWANS: SDN-based Wormhole Analysis using the neighbor similarity for a mobile ad hoc network (MANET). In 2021 IFIP/IEEE international symposium on integrated network management (IM) (pp. 653–657).
8.
Zurück zum Zitat Umoren, I., Okpongkpong, E., & Udoeka, I. (2021). A fuzzy knowledge-based approach for end-2-end behavioural analysis of wormhole attacks on mobile ad-hoc networks. International Journal of Information Systems and Informatics, 2(4), 1–17. Umoren, I., Okpongkpong, E., & Udoeka, I. (2021). A fuzzy knowledge-based approach for end-2-end behavioural analysis of wormhole attacks on mobile ad-hoc networks. International Journal of Information Systems and Informatics, 2(4), 1–17.
9.
Zurück zum Zitat Mirza, S., & Bakshi, S. Z. (2018). Introduction to MANET. International research journal of engineering and technology, 5(1), 17–20. Mirza, S., & Bakshi, S. Z. (2018). Introduction to MANET. International research journal of engineering and technology, 5(1), 17–20.
10.
Zurück zum Zitat Amutha, S., & Balasubramanian, K. (2018). Secured energy optimized ad hoc on-demand distance vector routing protocol. Computers and Electrical Engineering, 72, 766–773.CrossRef Amutha, S., & Balasubramanian, K. (2018). Secured energy optimized ad hoc on-demand distance vector routing protocol. Computers and Electrical Engineering, 72, 766–773.CrossRef
11.
Zurück zum Zitat Rezaei, S., Gharib, M., & Movaghar, A. (2018). Throughput analysis of IEEE 80211 multi-hop wireless networks with routing consideration: A general framework. IEEE Transactions on Communications, 66(11), 5430–5443.CrossRef Rezaei, S., Gharib, M., & Movaghar, A. (2018). Throughput analysis of IEEE 80211 multi-hop wireless networks with routing consideration: A general framework. IEEE Transactions on Communications, 66(11), 5430–5443.CrossRef
12.
Zurück zum Zitat Mao, Q., Hu, F., & Hao, Q. (2018). Deep learning for intelligent wireless networks: A comprehensive survey. IEEE Communications Surveys and Tutorials, 20(4), 2595–2621.CrossRef Mao, Q., Hu, F., & Hao, Q. (2018). Deep learning for intelligent wireless networks: A comprehensive survey. IEEE Communications Surveys and Tutorials, 20(4), 2595–2621.CrossRef
13.
Zurück zum Zitat Rath, M., Swain, J., Pati, B., & Pattanayak, B. K. (2018). Network security: Attacks and control in MANET. In Handbook of research on network forensics and analysis techniques, IGI Global (pp. 19–37). Rath, M., Swain, J., Pati, B., & Pattanayak, B. K. (2018). Network security: Attacks and control in MANET. In Handbook of research on network forensics and analysis techniques, IGI Global (pp. 19–37).
14.
Zurück zum Zitat Perazzo, P., Vallati, C., Varano, D., Anastasi, G., & Dini, G. (2018). Implementation of a wormhole attack against a rpl network: Challenges and effects. In 2018 14th Annual conference on wireless on-demand network systems and services (WONS), IEEE (pp. 95–102). Perazzo, P., Vallati, C., Varano, D., Anastasi, G., & Dini, G. (2018). Implementation of a wormhole attack against a rpl network: Challenges and effects. In 2018 14th Annual conference on wireless on-demand network systems and services (WONS), IEEE (pp. 95–102).
15.
Zurück zum Zitat Prasad, M., Tripathi, S., & Dahal, K. (2022). An enhanced detection system against routing attacks in mobile ad-hoc network. Wireless Networks, 28(4), 1411–1428.CrossRef Prasad, M., Tripathi, S., & Dahal, K. (2022). An enhanced detection system against routing attacks in mobile ad-hoc network. Wireless Networks, 28(4), 1411–1428.CrossRef
16.
Zurück zum Zitat Majumder, S., & Bhattacharyya, D. (2020). Relation estimation of packets dropped by wormhole attack to packets sent using regression analysis. In Emerging technology in modelling and graphics (pp. 557–566). Springer, Singapore. Majumder, S., & Bhattacharyya, D. (2020). Relation estimation of packets dropped by wormhole attack to packets sent using regression analysis. In Emerging technology in modelling and graphics (pp. 557–566). Springer, Singapore.
17.
Zurück zum Zitat Saudi, N. A. M., Arshad, M. A., Buja, A. G., Fadzil, A. F. A., & Saidi, R. M. (2019). Mobile ad-hoc network (MANET) routing protocols: A performance assessment. In Proceedings of the third international conference on computing, mathematics and statistics (iCMS2017) (pp. 53–59). Springer, Singapore. Saudi, N. A. M., Arshad, M. A., Buja, A. G., Fadzil, A. F. A., & Saidi, R. M. (2019). Mobile ad-hoc network (MANET) routing protocols: A performance assessment. In Proceedings of the third international conference on computing, mathematics and statistics (iCMS2017) (pp. 53–59). Springer, Singapore.
18.
Zurück zum Zitat Krishnan, R. S., Julie, E. G., Robinson, Y. H., Kumar, R., Tuan, T. A., & Long, H. V. (2020). Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks. Wireless Networks, 26(2), 1275–1289.CrossRef Krishnan, R. S., Julie, E. G., Robinson, Y. H., Kumar, R., Tuan, T. A., & Long, H. V. (2020). Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks. Wireless Networks, 26(2), 1275–1289.CrossRef
19.
Zurück zum Zitat Vo, T. T., Luong, N. T., & Hoang, D. (2019). MLAMAN: A novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network. Wireless Networks, 25(7), 4115–4132.CrossRef Vo, T. T., Luong, N. T., & Hoang, D. (2019). MLAMAN: A novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network. Wireless Networks, 25(7), 4115–4132.CrossRef
20.
Zurück zum Zitat Bhawsar, A., Pandey, Y., & Singh, U. (2020). Detection and prevention of wormhole attack using the trust-based routing system. In 2020 International conference on electronics and sustainable communication systems (ICESC) (pp. 809–814). IEEE. Bhawsar, A., Pandey, Y., & Singh, U. (2020). Detection and prevention of wormhole attack using the trust-based routing system. In 2020 International conference on electronics and sustainable communication systems (ICESC) (pp. 809–814). IEEE.
21.
Zurück zum Zitat Narayanan, S. S., & Murugaboopathi, G. (2020). Modified secure AODV protocol to prevent wormhole attack in MANET. Concurrency and Computation: Practice and Experience, 32(4), e5017. Narayanan, S. S., & Murugaboopathi, G. (2020). Modified secure AODV protocol to prevent wormhole attack in MANET. Concurrency and Computation: Practice and Experience, 32(4), e5017.
22.
Zurück zum Zitat Tiruvakadu, D. S. K., & Pallapa, V. (2018). Confirmation of wormhole attack in MANETs using honeypot. Computers and Security, 76, 32–49.CrossRef Tiruvakadu, D. S. K., & Pallapa, V. (2018). Confirmation of wormhole attack in MANETs using honeypot. Computers and Security, 76, 32–49.CrossRef
23.
Zurück zum Zitat Spurthy, K., & Shankar, T. N. (2020). An efficient cluster-based approach to thwart wormhole attack in adhoc networks. International Journal of Advanced Computer Science and Applications, 11(9), 312–316. Spurthy, K., & Shankar, T. N. (2020). An efficient cluster-based approach to thwart wormhole attack in adhoc networks. International Journal of Advanced Computer Science and Applications, 11(9), 312–316.
24.
Zurück zum Zitat Gayathri, S., Seetharaman, R., Subramanian, L. H., Premkumar, S., Viswanathan, S., & Chandru, S. (2019). Wormhole attack detection using energy model in MANETs. In 2019 2nd international conference on power and embedded drive control (ICPEDC) (pp. 264–268). IEEE. Gayathri, S., Seetharaman, R., Subramanian, L. H., Premkumar, S., Viswanathan, S., & Chandru, S. (2019). Wormhole attack detection using energy model in MANETs. In 2019 2nd international conference on power and embedded drive control (ICPEDC) (pp. 264–268). IEEE.
25.
Zurück zum Zitat As’adi, H., Keshavarz-Haddad, A., & Jamshidi, A. (2018). A new statistical method for wormhole attack detection in MANETs. In 2018 15th international ISC (Iranian society of cryptology) conference on information security and cryptology (ISCISC) (pp. 1–6), IEEE. As’adi, H., Keshavarz-Haddad, A., & Jamshidi, A. (2018). A new statistical method for wormhole attack detection in MANETs. In 2018 15th international ISC (Iranian society of cryptology) conference on information security and cryptology (ISCISC) (pp. 1–6), IEEE.
26.
Zurück zum Zitat Amish, P., & Vaghela, V. B. (2016). Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Computer Science 79, 700–707. Amish, P., & Vaghela, V. B. (2016). Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Computer Science 79, 700–707.
27.
Zurück zum Zitat Zardari, Z. A., Memon, K. A., Shah, R. A., Dehraj, S., & Ahmed, I. (2021). A lightweight technique for detection and prevention of wormhole attack in MANET. EAI Endorsed Transactions on Scalable Information Systems, 8(29), e2. Zardari, Z. A., Memon, K. A., Shah, R. A., Dehraj, S., & Ahmed, I. (2021). A lightweight technique for detection and prevention of wormhole attack in MANET. EAI Endorsed Transactions on Scalable Information Systems, 8(29), e2.
28.
Zurück zum Zitat Sun, P., Liu, H., Zhang, Y., Tu, L., & Meng, Q. (2021). An intensify atom search optimization for engineering design problems. Applied Mathematical Modelling, 89, 837–859.CrossRef Sun, P., Liu, H., Zhang, Y., Tu, L., & Meng, Q. (2021). An intensify atom search optimization for engineering design problems. Applied Mathematical Modelling, 89, 837–859.CrossRef
29.
Zurück zum Zitat Parmar, A., & Vaghela, V. B. (2016). Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Computer Science 79, 700–707. Parmar, A., & Vaghela, V. B. (2016). Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Computer Science 79, 700–707.
30.
Zurück zum Zitat Narayanan, S. S., & Murugaboopathi, G. (2020). Modified secure AODV protocol to prevent wormhole attack in MANET. Concurrency and Computation: Practice and Experience, 32(4), 5017. Narayanan, S. S., & Murugaboopathi, G. (2020). Modified secure AODV protocol to prevent wormhole attack in MANET. Concurrency and Computation: Practice and Experience, 32(4), 5017.
Metadaten
Titel
FSSAM: A Five Stage Security Analysis Model for Detecting and Preventing Wormhole Attack in Mobile Ad-Hoc Networks Using Adaptive Atom Search Algorithm
verfasst von
D. Hemanand
N. Sankar Ram
D. S. Jayalakshmi
Publikationsdatum
16.09.2022
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2023
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09964-9

Weitere Artikel der Ausgabe 1/2023

Wireless Personal Communications 1/2023 Zur Ausgabe

Neuer Inhalt