An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks

MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for the analysis of nodes behaviors and loss of specific offensive lines, this type of networks is not supportive against malicious nodes attacks. One of these attacks is black hole attack. In this attack, the malicious nodes absorb data packets and destroy them. Thus, it is essential to present an algorithm against the black hole attacks. This paper proposed a new approach, which improvement the security of DSR routing protocol to encounter the black hole attacks. This schema tries to identify malicious nodes according to nodes behaviors in a MANETs and isolate them from routing. The proposed protocol, called AIS-DSR (Artificial Immune System DSR) employ AIS (Artificial Immune System) to defend against black hole attacks. AIS-DSR is evaluated through extensive simulations in the ns-2 environment. The results show that AIS-DSR outperforms other existing solutions in terms of throughput, end-to-end delay, packets loss ratio and packets drop ratio.

[1]  Mahdieh Ghazvini,et al.  A modified algorithm to improve security and performance of AODV protocol against black hole attack , 2015, Wireless Networks.

[2]  F. Freiling,et al.  Towards Intrusion Detection in Wireless Sensor Networks , 2007 .

[3]  Ameeta Seehra Detection and Prevention of Black-Hole Attack in MANETS , 2014 .

[4]  Athanasios V. Vasilakos,et al.  Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter , 2015, IEEE Transactions on Information Forensics and Security.

[5]  R. H. Jhaveri,et al.  A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad Hoc Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[6]  Shahram Behzad,et al.  An Improvement Over Threads Communications on Multi-Core Processors , 2019, ArXiv.

[7]  Can Zhang,et al.  Detection and Defense Technology of Blackhole Attacks in Wireless Sensor Network , 2014, ICA3PP.

[8]  Syed Jalal Ahmad,et al.  Detection of Black Hole Attack Using Code Division Security Method , 2015 .

[9]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[10]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[11]  Reza Fotohi,et al.  An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System , 2020, ArXiv.

[12]  Shahram Jamali,et al.  Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops , 2013 .

[13]  Shahram Jamali,et al.  A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks , 2014 .

[14]  Mazdak Zamani,et al.  A secure model for prevention of black hole attack in wireless mobile ad hoc networks , 2013 .

[15]  Shahram Jamali,et al.  An Improvement over AODV Routing Protocol by Limiting Visited Hop Count , 2013 .

[16]  Shahram Jamali,et al.  Performance Evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV Routing Protocols , 2013 .

[17]  Athanasios V. Vasilakos,et al.  Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.

[18]  Ming-Yang Su,et al.  Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..

[19]  Jamali Shahram,et al.  A Hybrid Routing Method for Mobile ad-hoc Networks , 2016 .

[20]  Reza Fotohi,et al.  A Cluster Based Job Scheduling Algorithm for Grid Computing , 2013 .

[21]  Reza Fotohi,et al.  A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network , 2020, International Journal of Advanced Computer Science and Applications.

[22]  R. Saravanan,et al.  A Novel Security Approach for Detecting Black Hole Attack in MANET , 2010, BAIP.

[23]  Mehdi Medadian,et al.  Combat with Black hole attack in AODV routing protocol in MANET , 2009, 2009 First Asian Himalayas International Conference on Internet.

[24]  Athanasios V. Vasilakos,et al.  Provably secure three-party authenticated key agreement protocol using smart cards , 2014, Comput. Networks.

[25]  Vrinda Tokekar,et al.  Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[26]  Weijie Liu,et al.  A cluster-based countermeasure against blackhole attacks in MANETs , 2014, Telecommun. Syst..

[27]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[28]  Athanasios V. Vasilakos,et al.  DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.

[29]  Shahram Jamali,et al.  A Simulative Comparison of DSDV and OLSR Routing Protocols , 2012 .

[30]  Huirong Fu,et al.  Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).

[31]  Shahram Behzad,et al.  Queue based Job Scheduling algorithm for Cloud computing , 2013 .

[32]  Shahram Jamali,et al.  Defending against Wormhole Attack in MANET Using an Artificial Immune System , 2016 .

[33]  Manish Sharma,et al.  Performance evaluation aodv , 2012 .

[34]  Shahram Jamali,et al.  DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system , 2017, The Journal of Supercomputing.

[35]  Athanasios V. Vasilakos,et al.  A security and trust framework for virtualized networks and software-defined networking , 2016, Secur. Commun. Networks.

[36]  Shahram Behzad,et al.  Defense Against the Attacks of the Black Hole , Gray Hole and Wormhole in MANETs Based on RTT and PFT , 2015 .

[37]  Satria Mandala,et al.  Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks , 2014, SSCC.