Cross layer packet drop attack detection in MANET using swarm intelligence

The mobile ad hoc networks gained its popularity for its various applications, quick and easy deployment. This network does not require any fixed infrastructure for deployment. Mobile nodes in this network communicate with each other through a wireless communication medium and makes this network highly vulnerable to many attacks. One of the well-known attack is packet drop attack. Whenever the network faces any kind of attack suddenly degrades network performance. In this paper, we have designed a protocol known as cross-layer packet drop attack detection using swarm intelligence (CLPDM-SI). This protocol followed a cluster based collective swarm intelligence detection mechanism to find a malicious node in real data acquisition system which undergoes packet drop attack. Our protocol (CLPDM-SI) is compared with a protocol which does not follow swarm intelligence known as Adapting Cross-Layer Approach for Detecting and Segregating Malicious Nodes (ACLDSM) mechanisms. Our comparison is done based on various QoS parameters delay, throughput, packet delivery ratio and false positive detection in the MAC layer. Our result shows significant improvements after incorporating the swarm intelligence. By inspecting CPU and memory utilization time, the algorithm finds the false positive of suspected malicious nodes.

[1]  S. Karthik,et al.  A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features , 2015, TheScientificWorldJournal.

[2]  Yuxin Zhao,et al.  Swarm Intelligence: Today and Tomorrow , 2016, 2016 3rd International Conference on Soft Computing & Machine Intelligence (ISCMI).

[3]  Mallesham Dasari,et al.  Real time detection of MAC layer DoS attacks in IEEE 802.11 wireless networks , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[4]  Salvatore D. Morgera,et al.  A Cross-Layer, Anomaly-Based IDS for WSN and MANET , 2018, Sensors.

[5]  Kennedy Edemacu,et al.  Packet Drop Attack Detection Techniques in Wireless Ad hoc Networks: A Review , 2014, ArXiv.

[6]  P. Deepa Shenoy,et al.  CMNTS: Catching malicious nodes with trust support in wireless sensor networks , 2016, 2016 IEEE Region 10 Symposium (TENSYMP).

[7]  Sidi-Mohammed Senouci,et al.  A distributed prevention scheme from malicious nodes in VANETs' routing protocols , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[8]  Cesare Alippi,et al.  An Adaptive LLC-Based and Hierarchical Power-Aware Routing Algorithm , 2009, IEEE Transactions on Instrumentation and Measurement.

[9]  Jasvir Singh,et al.  Analysis of Swarm Intelligence Optimization Techniques Used in MANETs: A Survey , 2017 .

[10]  Mahesh Motwani,et al.  Survey of clustering algorithms for MANET , 2009, ArXiv.

[11]  James Kennedy,et al.  Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.

[12]  K. Selvakumar,et al.  Handling Cross-Layer Attacks Using Neighbors Monitoring Scheme and Swarm Intelligence in MANET , 2012 .

[13]  A. K. Mousa,et al.  Comment on “On Soft β-Open Sets and Soft β-Continuous Functions” , 2015, TheScientificWorldJournal.

[14]  K. Soundararajan,et al.  Adopting cross layer approach for detecting and segregating malicious nodes in MANET , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).