Multidimensional Multi-Attribute Approach to Counter the Routing Attacks on MANET

The Dynamic on demand network formation feature of MANET tend to have its biggest the vulnerability that infect the process of route establishment using routing algorithms and exploits many attacks. Identifying the attack and isolating the malicious node to reform the secured routing environment is the major goal of all researchers working for securing the MANET. IDS and trust based collaborative approach (ITCA) is the our first proposed published method which provides the platform for hybrid approach to trap the malicious nodes through combined efforts from multiple dimensions.The proposed framework utilize the benefit of Reputation and Trust based evaluation process to secure route discovery by isolating malicious nodes at early stage of route formation. The more advanced approach, multi-dimensional multi-attribute system (MDMA), incorporates multi-attribute direct, indirect trust mechanism, and use of measured risk by credibility factor, while considering indirect trust. It empowers IDS and make the ITCA more efficient. The attributes considered for calculations of trust are adaptable to change in application environment make MDMA a flexible generalized solution. The MDMA is evaluated by implementing using AODV and compared with our previous proposed method ITCA along with many other solutions. The results are better and more adaptable to the changing environment.

[1]  Jairo A. Gutiérrez,et al.  DATM: a dynamic attribute trust model for efficient collaborative routing , 2019, Ann. Oper. Res..

[2]  N. Radha,et al.  Secure and attack aware routing in mobile ad hoc networks against wormhole and sinkhole attacks , 2017, 2017 2nd International Conference on Communication and Electronics Systems (ICCES).

[3]  Mozmin Ahmed,et al.  Performance of an IDS in an Adhoc Network under Black Hole and Gray Hole attacks , 2014, International Conference on Electronics, Communication and Instrumentation (ICECI).

[4]  Shariq Mahmood Khan,et al.  A Novel Approach for Reliable Route Discovery in Mobile Ad-Hoc Network , 2015, Wirel. Pers. Commun..

[5]  Rahul Rishi,et al.  Secure routing in MANETs using three reliable matrices , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[6]  Pramod K. Varshney,et al.  TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[7]  Danai Chasaki,et al.  Identifying malicious behavior in MANET through data path information , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[8]  Govind Sharma,et al.  An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[9]  R H Goudar,et al.  Intrusion detection systems in MANETs using hybrid techniques , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).

[10]  Arnab Majumdar,et al.  Different secured routing protocols for mobile Ad Hoc networks and its vulnerabilities: A review , 2015, 2015 International Conference and Workshop on Computing and Communication (IEMCON).

[11]  M. Narayanan,et al.  Identifying malicious nodes in Mobile Ad-Hoc Networks using polynomial reduction algorithm , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[12]  Michael P. Howarth,et al.  A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.

[13]  Vandana Dubey,et al.  Modification in routing mechanism of AODV for defending blackhole and wormhole attacks , 2014, 2014 Conference on IT in Business, Industry and Government (CSIBIG).

[14]  Anastasios A. Economides,et al.  Performance comparison of MANET routing protocols based on real-life scenarios , 2012, 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems.

[15]  Xue Jun Li,et al.  An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs , 2019, IEEE Transactions on Mobile Computing.

[16]  Bharat K. Bhargava,et al.  SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems , 2013, IEEE Transactions on Dependable and Secure Computing.

[17]  Subhash K. Shinde,et al.  Improved ITCA Method to Mitigate Network-Layer Attack in MANET , 2020 .

[18]  Thouraya Bouabana-Tebibel,et al.  A trust-based Probing to secure data routing , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[19]  Rachika Gupta Mobile Adhoc Network(MANETS) : Proposed solution to Security Related Issues , 2011 .

[20]  Puja Padiya,et al.  A generic request/reply based algorithm for detection of blackhole attack in MANET , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).

[21]  Puja Padiya,et al.  Improved EAACK scheme for detection and isolation of a malicious node in MANET , 2015, 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).

[22]  Subhash K. Shinde,et al.  ITCA, an IDS and Trust Solution Collaborated with ACK Based Approach to Mitigate Network Layer Attack on MANET Routing , 2019, Wirel. Pers. Commun..

[23]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[24]  Munesh Chandra Trivedi,et al.  Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme , 2017, 2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON).

[25]  John Haggerty,et al.  A survey of the mitigation methods against DoS attacks on MANETs , 2014, 2014 Science and Information Conference.

[26]  Ashraf S. Hasan Mahmoud,et al.  Video transmission enhancement in presence of misbehaving nodes in MANETs , 2009, Multimedia Systems.

[27]  Adwan Yasin,et al.  Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique , 2018, Wirel. Commun. Mob. Comput..

[28]  Kunagorn Kunavut,et al.  Performance and comparative analysis of energy consumption for mobile ad hoc routing protocols , 2014, 2014 14th International Symposium on Communications and Information Technologies (ISCIT).

[29]  Puja Padiya,et al.  A generic request/reply based algorith for detection of blackhole attack in manet: Simulation result , 2017, 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[30]  Yanheng Liu,et al.  Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..

[31]  Radhika Saini,et al.  Establishment of Dynamic Trust among Nodes in Mobile Ad-Hoc Network , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.

[32]  K. Sangeetha,et al.  Adaptive ACKnowledgement technique with key exchange mechanism for MANET , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).

[33]  Houda Moudni,et al.  Modified AODV routing protocol to improve security and performance against black hole attack , 2016, 2016 International Conference on Information Technology for Organizations Development (IT4OD).

[34]  Ignas G. Niemegeers,et al.  From Personal Area Networks to Personal Networks: A User Oriented Approach , 2002, Wirel. Pers. Commun..

[35]  Ashok Verma,et al.  Effect Of Grayhole Attack With Ids Technique For Aodv Routing Protocol Using Network Simulator , 2014 .