Abstract
A power aware detection procedure for securing mobile ad hoc networks (MANETs) against packet forwarding misbehavior attack is introduced. Packet forwarding misbehavior attack is one of the security attacks in which malicious nodes make MANETs weak by showing packet dropping misconduct. The proposed protocol is named as power aware malicious detection for security (PAMDS) protocol. The feature of power aware is desirable to prolong MANET lifetime as under certain conditions, it is impracticable to replace or recharge the nodes’ batteries. The protocol employs intrusion detection system (IDS) for the detection and exclusion of the nodes inducing packet forwarding misbehavior attack in the network. The detection procedure reacts quickly in detecting and isolating malicious nodes. The detection procedure is power aware as only a small set of nodes that have enough energy and that cover the entire network are selected for running IDS. Also, IDS nodes are not required to work in promiscuous listening mode 100% of the time, this further saves power. PAMDS protocol emphasizes on security of the mobile ad hoc environment and power saving of the battery powered hand held devices. The protocol has been extensively simulated using network simulator NS-2. The findings indicate that PAMDS protocol is effective in terms of power saving, quick malicious node isolation and packet delivery ratio percentage.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ahila E, Chitra K (2014) Security based energy efficient routing protocol for adhoc network. In: Proceedings of IEEE international conference on control, instrumentation, communication and computational technologies (ICCICCT), pp 1522–1526. ISBN: 978-1-4799-4191-9
Ahmed A, Bakar KA, Channa MI, Haseeb K, Khan AW (2016) A trust aware routing protocol for energy constrained wireless sensor network. Telecommun Syst 61:123–140. doi:10.1007/s11235-015-0068-8
Asadi M, Zimmerman C, Agah A (2013) A game theoretic approach to security and power conservation in wireless sensor networks. Int J Netw Secur 15:50–58
Banergee S (2008) Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks. In: Proceedings of the world congress on engineering and computer science (WCECS 2008), WCECS, San Francisco, USA, pp 337–342. ISBN: 978-988-98671-0-2
Biswas S, Nag T, Neogy S (2014) Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. In: Proceedings of IEEE applications and innovations in mobile computing (AIMoC), pp 157–164. doi:10.1109/AIMOC.2014.6785535. ISBN: 978-1-4799-3881-0
Buchegger S, Boudec J Y L (2002) Performance analysis of the CONFIDANT protocol. In: Proceedings of 3rd ACM international symposium on mobile ad hoc networking and computing (MobiHoc ’02), Lausanne, Switzerland, pp 226–236. doi:10.1145/513800.513828. ISBN: 1-58113-501-7
Cano J C, Kim D (2002) Investigating performance of power-aware routing protocols for mobile ad-hoc networks. In: Proceedings of the international workshop on mobility and wireless access (MobiWac 2002), IEEE Computer Society, Washington, DC, USA, pp 80–86. doi:10.1109/MOBWAC.2002.1166956. ISBN: 0-7695-1843-5
Dhurandher S K, Woungang I, Traore I (2014) C-SCAN: an energy-efficient network layer security protocol for mobile ad hoc networks. In: Proceedings of 28th IEEE international conference on advanced information networking and applications workshops (WAINA), pp 530–535. doi:10.1109/WAINA.2014.85. ISBN: 978-1-4799-2654-1
Estahbanati M M, Rasti M, Hamami S M S (2014) A mobile ad hoc network routing based on energy and Markov chain trust. In: Proceedings of IEEE 7th international symposium on telecommunications (IST), pp 596–601. doi:10.1109/ISTEL.2014.7000775
Ghander A, Shaaban E (2015) Power aware cooperation enforcement MANET routing protocols. Procedia Comput Sci 73:162–171. doi:10.1016/j.procs.2015.12.062
Gong P, Chen TM, Xu Q (2015) ETARP: An energy efficient trust-aware routing protocol for wireless sensor networks. J Sens. doi:10.1155/2015/469793
Gonzalez OF, Howarth M, Pavlou G (2008) Detection and accusation of packet forwarding misbehavior in mobile ad hoc networks. J Internet Eng 2:181–192
Heena, Kumar N (2014) Battery power and trust based routing strategy for MANET. In: Proceedings of IEEE international conference on advanced communication control and computing technologies (ICACCCT), pp 1559–1562. doi:10.1109/ICACCCT.2014.7019368. ISBN: 978-1-4799-3915-2
Hu YC, Johnson DB, Perrig A (2003) SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Netw 1:175–192. doi:10.1016/S1570-8705(03)00019-2
Hu YC, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11:38. doi:10.1007/s11276-004-4744-y
Jain H R, Sharma S K (2014) Improved energy efficient secure multipath AODV routing protocol for MANET. In: Proceedings of IEEE international conference on advances in engineering and technology research (ICAETR), pp 1–9. doi:10.1109/ICAETR.2014.7012847
Johnson D B, Maltz D A (1996) Dynamic source routing in ad hoc wireless networks. In: Mobile computing, the Kluwer International series in engineering and computer science, vol 353, Springer, US, pp 153–218. doi:10.1007/978-0-585-29603-6_5. ISBN: 978-0-7923-9697-0
Li J, Cordes D, Zhang J (2005) Power-aware routing protocols in ad hoc wireless networks. IEEE Wirel Commun 12:69–81. doi:10.1109/MWC.2005.1561947
Li Y, Peng S, Chu W (2006) An efficient algorithm for finding an almost connected dominating set of small size on wireless ad hoc networks. In: Proceedings of 2006 IEEE international conference on mobile adhoc and sensor systems (MASS), pp 199–205. doi:10.1109/MOBHOC.2006.278557. ISBN: 1-4244-0506-8
Lu Y, Zhong Y, Bhargava B (2003) Packet loss in mobile ad hoc networks. Computer Science Technical Reports, Paper 1558, Department of Computer Science, Purdue University. Report Number: 03-009. http://docs.lib.purdue.edu/cstech/1558
Marti S, Giuli T J, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of sixth annual international conference on mobile computing and networking (MobiCom ’00), Boston, USA, pp 255–265. doi:10.1145/345910.345955. ISBN:1-58113-197-6
Misra S, Dhurandher SK, Obaidat MS, Gupta P, Verma K, Narula P (2010) An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks. J Syst Softw 83:2188–2199. doi:10.1016/j.jss.2010.06.025
Mohanapriya M, Krishnamurthi I (2014) Modified DSR protocol for detection and removal of selective black hole attack in MANET. Comput Electr Eng 40:530–538. doi:10.1016/j.compeleceng.2013.06.001
Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection and prevention approaches for network layer attacks. IEEE Commun Surv Tutor 15:2027–2045. doi:10.1109/SURV.2013.030713.00201
Network simulator 2 (NS–2). http://www.isi.edu/nsnam/ns/. Accessed 13 Nov 2016
Perrig A, Canetti R, Tygar J D, Song D (2000) Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of IEEE symposium on security and privacy, Berleley, USA. doi:10.1109/SECPRI.2000.848446. ISBN: 1081-6011
Sarkar S, Datta R (2012) A trust based protocol for energy-efficient routing in self-organized MANETs. In: Proceedings of annual IEEE India Conference (INDICON), pp 1084–1089. doi:10.1109/INDCON.2012.6420778. ISBN: 978-1-4673-2270-6
Sarkar S, Datta R (2014) A secure and energy-efficient stochastic routing protocol for wireless mobile ad-hoc networks. In: Proceedings of IEEE twentieth national conference on communications (NCC), pp 1–6. doi:10.1109/NCC.2014.6811358. ISBN: 978-1-4799-2363-2
Sarkar S, Datta R (2016) A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Netw 37:209–227. doi:10.1016/j.adhoc.2015.08.020
Sheu JP, Chao CM, Hu WK, Sun CW (2007) A clock synchronization algorithm for multihop wireless ad hoc networks. Wirel Pers Commun 43:185–200. doi:10.1007/s11277-006-9217-4
Sridhar S, Baskaran R, Chandrasekar P (2013) Energy supported AODV (EN-AODV) for QoS routing in MANET, In: Proceedings of the 2nd international conference on integrated information (IC-ININFO 2012), Budapest, Hungary, vol 73 of Procedia—Social and Behavioral Sciences, pp 294–301. doi:10.1016/j.sbspro.2013.02.055
Su MY (2011) Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput Commun 34:107–117. doi:10.1016/j.comcom.2010.08.007
Subramaniam S, Ramachandran R (2014) Energy-and trust-based AODV for quality-of-service affirmation in MANETs. In: Artificial intelligence and evolutionary algorithms in engineering systems, vol 324 of the series advances in intelligent systems and computing. Springer India, pp 601–607. doi:10.1007/978-81-322-2126-5_65. ISBN: 978-81-322-2125-8
Tan S, Li X, Dong Q (2015) Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw 30:84–98. doi:10.1016/j.adhoc.2015.03.004
Vazifehdan J, Prasad RV, Onur E, Niemegeers I (2011) Energy-aware routing algorithms for wireless ad hoc networks with heterogeneous power supplies. Comput Netw 55:3256–3274. doi:10.1016/j.comnet.2011.06.015
Wang Y (2010) Study on energy conservation in MANET. J Netw 5:708–715
Woungang I, Dhurandher S K, Sahai M (2013) An energy-aware secured routing protocol for mobile ad hoc networks using trust-based multipath. In: Grid and pervasive computing, vol 7861 of the series lecture notes in computer science. Springer, Berlin, pp 517–525. doi:10.1007/978-3-642-38027-3_55. ISBN: 978-3-642-38026-6
Yang H, Shu J, Meng X, Lu S (2006) SCAN: self-organized network-layer security in mobile ad hoc networks. IEEE J Sel Areas Commun 24:261–273. doi:10.1109/JSAC.2005.861384
Yang T, Wei L (2007) Modified energy-aware DSR routing for ad hoc network. In: Proceedings of the international conference on wireless communications, networking and mobile computing (WiCom 2007), pp 1601–1603. doi:10.1109/WICOM.2007.403
Zapata MG (2002) Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Comput Commun 6:106–107. doi:10.1145/581291.581312
Zhang Y, Lee W (2005) Security in mobile ad-hoc networks. In: Ad hoc networks, pp 249–268. doi:10.1007/0-387-22690-7_9. ISBN: 978-0-387-22689-7
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kukreja, D., Dhurandher, S.K. & Reddy, B.V.R. Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. J Ambient Intell Human Comput 9, 941–956 (2018). https://doi.org/10.1007/s12652-017-0496-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-017-0496-2