Skip to main content
Erschienen in: Wireless Personal Communications 3/2021

05.03.2021

Multidimensional Multi-Attribute Approach to Counter the Routing Attacks on MANET

verfasst von: Nilesh R. Marathe, Subhash K. Shinde

Erschienen in: Wireless Personal Communications | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Dynamic on demand network formation feature of MANET tend to have its biggest the vulnerability that infect the process of route establishment using routing algorithms and exploits many attacks. Identifying the attack and isolating the malicious node to reform the secured routing environment is the major goal of all researchers working for securing the MANET. IDS and trust based collaborative approach (ITCA) is the our first proposed published method which provides the platform for hybrid approach to trap the malicious nodes through combined efforts from multiple dimensions.The proposed framework utilize the benefit of Reputation and Trust based evaluation process to secure route discovery by isolating malicious nodes at early stage of route formation. The more advanced approach, multi-dimensional multi-attribute system (MDMA), incorporates multi-attribute direct, indirect trust mechanism, and use of measured risk by credibility factor, while considering indirect trust. It empowers IDS and make the ITCA more efficient. The attributes considered for calculations of trust are adaptable to change in application environment make MDMA a flexible generalized solution. The MDMA is evaluated by implementing using AODV and compared with our previous proposed method ITCA along with many other solutions. The results are better and more adaptable to the changing environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
3.
Zurück zum Zitat Gupta, R., & Jain, C. (2011). Mobile Adhoc network(MANETS): Proposed solution to security related issues. Indian Journal of Computer Science and Engineering (IJCSE), 2(5), 738–746. Gupta, R., & Jain, C. (2011). Mobile Adhoc network(MANETS): Proposed solution to security related issues. Indian Journal of Computer Science and Engineering (IJCSE), 2(5), 738–746.
8.
9.
Zurück zum Zitat Bhagat, S., Padiya, P., & Marathe, N. (2017). A generic request/reply based algorithm for detection of black hole attack in MANET: Simulation result. In 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Vol. 00, 2017, pp. 1–7. https://doi.org/10.1109/ICCCNT.2017.8204058. Bhagat, S., Padiya, P., & Marathe, N. (2017). A generic request/reply based algorithm for detection of black hole attack in MANET: Simulation result. In 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Vol. 00, 2017, pp. 1–7. https://​doi.​org/​10.​1109/​ICCCNT.​2017.​8204058.
11.
Zurück zum Zitat Marathe, N. R., & Shinde, S. K. (2020). Improved itca method to mitigate network-layer attack in manet. In: Jain, L. C., Tsihrintzis, G. A., Balas, V. E., & Sharma, D. K. (Eds.) Data communication and networks. Springer, Singapore, 2020, pp. 245–253. https://doi.org/10.1007/978-981-15-0132-6_16. Marathe, N. R., & Shinde, S. K. (2020). Improved itca method to mitigate network-layer attack in manet. In: Jain, L. C., Tsihrintzis, G. A., Balas, V. E., & Sharma, D. K. (Eds.) Data communication and networks. Springer, Singapore, 2020, pp. 245–253. https://​doi.​org/​10.​1007/​978-981-15-0132-6_​16.
15.
Zurück zum Zitat Moudni, H., Er-rouidi, M., Mouncif, H., & Hadadi, B. E.(2016). Modified AODV routing protocol to improve security and performance against black hole attack. In 2016 International Conference on Information Technology for Organizations Development (IT4OD), 2016, pp. 1–7. https://doi.org/10.1109/IT4OD.2016.7479265. Moudni, H., Er-rouidi, M., Mouncif, H., & Hadadi, B. E.(2016). Modified AODV routing protocol to improve security and performance against black hole attack. In 2016 International Conference on Information Technology for Organizations Development (IT4OD), 2016, pp. 1–7. https://​doi.​org/​10.​1109/​IT4OD.​2016.​7479265.
16.
Zurück zum Zitat Singh, G., Rishi, R., & Rohil, H. (2016). Secure routing in MANETs using three reliable matrices. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016, pp. 880–884. Singh, G., Rishi, R., & Rohil, H. (2016). Secure routing in MANETs using three reliable matrices. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016, pp. 880–884.
18.
Zurück zum Zitat Yadav, S., Trivedi, M. C., Singh, V. K., & Kolhe, M. L. (2017). Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme. In 2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON), 2017, pp. 1–4. https://doi.org/10.1109/UPCON.2017.8251012. Yadav, S., Trivedi, M. C., Singh, V. K., & Kolhe, M. L. (2017). Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme. In 2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON), 2017, pp. 1–4. https://​doi.​org/​10.​1109/​UPCON.​2017.​8251012.
24.
Zurück zum Zitat Varma, D. A., & Narayanan, M. (2016). Identifying malicious nodes in mobile ad-hoc networks using polynomial reduction algorithm. In 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016, pp. 1179–1184. https://doi.org/10.1109/ICEEOT.2016.7754870. Varma, D. A., & Narayanan, M. (2016). Identifying malicious nodes in mobile ad-hoc networks using polynomial reduction algorithm. In 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016, pp. 1179–1184. https://​doi.​org/​10.​1109/​ICEEOT.​2016.​7754870.
26.
Zurück zum Zitat Neekhra, A. V. A. C., & Garima, & Patel, S. . (2014). Effect of grayhole attack with Ids technique for AODV routing protocol using network simulator. International Journal of Advanced Research in Computer Engineering and Technology (IJARCET), 3, 4184–4190. Neekhra, A. V. A. C., & Garima, & Patel, S. . (2014). Effect of grayhole attack with Ids technique for AODV routing protocol using network simulator. International Journal of Advanced Research in Computer Engineering and Technology (IJARCET), 3, 4184–4190.
28.
32.
Zurück zum Zitat Sharma, A., Bhuriya, D., Singh, U., & Singh, S. (2014). Prevention of black hole attack in AODV routing algorithm of MANET using trust based computing. https://doi.org/10.1.1.640.2105. Sharma, A., Bhuriya, D., Singh, U., & Singh, S. (2014). Prevention of black hole attack in AODV routing algorithm of MANET using trust based computing. https://​doi.​org/​10.​1.​1.​640.​2105.​
Metadaten
Titel
Multidimensional Multi-Attribute Approach to Counter the Routing Attacks on MANET
verfasst von
Nilesh R. Marathe
Subhash K. Shinde
Publikationsdatum
05.03.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08315-4

Weitere Artikel der Ausgabe 3/2021

Wireless Personal Communications 3/2021 Zur Ausgabe

Neuer Inhalt