Mitigation of Sybil Attack in Mobile Ad Hoc Network Using CRYPTO-DSR: A Novel Routing Protocol

Authors

  • Sayan Majumder The Heritage Academy, Kolkata – 700107, India
  • Debika Bhattacharyya Institute of Engineering & Management, Kolkata – 700091, India
  • Subhalaxmi Chakraborty University of Engineering & Management, Kolkata – 700160, India

Keywords:

DSR, Hash Function, MANET, Sybil, Throughput

Abstract

As MANET is ad hoc, dynamic topology is a key function of this network, making MANET prone to different security threats. Although numerous routing protocols and methods exist to find and alleviate Sybil attacks in MANET, the hash function-based DSR protocol is a completely new idea. In this research article, we have introduced a new cryptography-based dynamic source routing protocol, named CRYPTO-DSR. First, we calculated the minimum distance of the route from the origin to the target node using Johnson’s algorithm. We then secured the packets full of data inside the nodes using the hash function technique. After decryption, if the packets are found to be accurate, they are forwarded to the subsequent node and so on until they reach the destination. We compared our modified DSR protocol with the normal one and concluded that our crypto-based DSR protocol is much more secure and environmentally friendly than the traditional one in relation to performance, as measured by throughput, end-to-end delay, and the data transfer success rate during a Sybil attack.

Downloads

Download data is not yet available.

References

M. Bharti, S. Rani and P. Singh, "Security Attacks in MANET: A Complete Analysis," 2022 6th International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India, 2022, pp. 384- 387, doi: 10.1109/ICDCS54290.2022.9780760.

A. Hameed and A. Al-Omary, "Survey of blackhole attack on MANET," 2nd Smart Cities Symposium (SCS 2019), Bahrain, Bahrain, 2019, pp. 1-4, doi: 10.1049/cp.2019.0224.

P. K. Sharma and V. Sharma, "Survey on security issues in MANET: Wormhole detection and prevention," 2016 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, 2016, pp. 637-640, doi: 10.1109/CCAA.2016.7813799.

S. Kaur, R. Kaur and A. K. Verma, "Jellyfish attack in MANETs: A review," 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, 2015, pp. 1-5, doi: 10.1109/ICECCT.2015.7226168.

Gautam, D., Tokekar, V. (2020). Pattern-Based Detection and Mitigation of DoS Attacks in MANET Using SVM-PSO. In: Pandit, M., Srivastava, L., Venkata Rao, R., Bansal, J. (eds) Intelligent Computing Applications for Sustainable Real-World Systems. ICSISCET 2019. Proceedings in Adaptation, Learning and Optimization, vol 13. Springer, Cham. https://doi.org/10.1007/978-3-030-44758-8_16

Ávila, K., Sanmartin, P., Jabba, D. et al. An analytical Survey of Attack Scenario Parameters on the Techniques of Attack Mitigation in WSN. Wireless Pers Commun 122, 3687–3718 (2022). https://doi.org/10.1007/s11277-021-09107-6

Almesaeed, R., Al-Salem, E. Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks. Wireless Netw 28, 1361–1374 (2022). https://doi.org/10.1007/s11276-021-02871-0.

Abolfazl Mehbodniya, Julian L. Webber, Mohammad Shabaz, Hamidreza Mohafez & Kusum Yadav (2021)Machine Learning Technique to Detect Sybil Attack on IoT Based Sensor Network, IETE Journal of Research, DOI: 10.1080/03772063.2021.2000509.

C. Sharma and R. Vaid, "A Novel Sybil Attack Detection and Prevention Mechanism for Wireless Sensor Networks," 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC), Solan, India, 2021, pp. 340-345, doi: 10.1109/ISPCC53510.2021.9609450.

A. Sharma, D. Bhuriya and U. Singh, "Secure data transmission on MANET by hybrid cryptography technique," 2015 International Conference on Computer, Communication and Control (IC4), Indore, India, 2015, pp. 1-6, doi: 10.1109/IC4.2015.7375688.

R. K. Kapur and S. K. Khatri, "Secure data transfer in MANET using symmetric and asymmetric cryptography," 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), Noida, India, 2015, pp. 1-5, doi:10.1109/ICRITO.2015.7359293.

Kumar, Chaitanya & Basit, Abdul & Singh, Priyadarshi & Venkaiah, Vadlamudi. (2018). Lightweight cryptography for distributed PKI-based MANETS. International Journal of Computer Networks and Communications. 10.10.5121/ijcnc.2018.10207.

P. D. Nikam and V. Raut, "Improved MANET Security Using Elliptic Curve Cryptography and EAACK," 2015 International Conference on Computational Intelligence and Communication Networks (CICN), Jabalpur, India, 2015, pp. 1125-1129, doi: 10.1109/CICN.2015.221.

Muruganandam, S. , Srinivasan, N. and Sivaprakasam, A. 2022. An Intelligent Method for Intrusion Detection and Prevention in Mobile AdHoc Networks. International Journal of Intelligent Systems and Applications in Engineering. 10, 3 (Oct. 2022), 154–160.

T. Poongodi, M. S. Khan, R. Patan, A. H. Gandomi and B. Balusamy, "Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks," in IEEE Access, vol. 7, pp. 18409-18419, 2019, doi: 10.1109/ACCESS.2019.2896001.

Allahham, Alaa & Mohammed, Muamer. (2017). A MODIFIED ROUTE DISCOVERY APPROACH FOR DYNAMIC SOURCE ROUTING (DSR) PROTOCOL IN MOBILE AD-HOC NETWORKS. International Journal of Software Engineering and Computer Systems. 3. 17-30.10.15282/ijsecs.3.2017.2.0024.

S. S. Jathe and V. Dhamdhere, "Hybrid Cryptography for Malicious Behavior Detection and Prevention System for MANETs," 2015 International Conference on Computational Intelligence and Communication Networks (CICN), Jabalpur, India, 2015, pp. 1108-1114, doi: 10.1109/CICN.2015.218.

Bang, A.O., Rao, U.P. A novel decentralized security architecture against Sybil attack in RPL-based IoT networks: a focus on smart home use case. J Supercomput 77, 13703–13738 (2021). https://doi.org/10.1007/s11227-021-03816-2.

Lucindia Dupak and Subhasish Banerjee. 2022. Hybrid trust and weight evaluation-based trust assessment using ECK-ANFIS and AOMDV-REPO-based optimal routing in a MANET environment. J. Supercomput. 78, 15 (Oct 2022), 17074–17094. https://doi.org/10.1007/s11227-022-04530-3.

S. Anitha and B. M. Ramesh, "Network Reconfiguration for Loss Minimization by Using Johnson's Algorithm," 2018 4th International Conference on Electrical Energy Systems (ICEES), Chennai, India, 2018, pp. 680-684, doi: 10.1109/ICEES.2018.8442416.

Shanmuganathan, C, Boopalan, K, Elangovan, G, Sathish Kumar, P. Enabling security in MANETs using an efficient cluster-based group key management with elliptical curve cryptography in consort with sail fish optimization algorithm. Trans Emerging Tel Tech. 2023; 34( 3):e4717.doi:10.1002/ett.4717.

Zhang, D, Liu, S, Liu, X, Zhang, T, Cui, Y. Novel dynamic source routing protocol (DSR) based on genetic algorithm-bacterial foraging optimization (GA-BFO). Int J Commun Syst. 2018; 31:e3824. https://doi.org/10.1002/dac.3824

A. Maheswary and S. Baskar, "Letter to shape encryption for securing MANET routing protocols," 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Chennai, India, 2016, pp. 1-4, doi: 10.1109/ICCIC.2016.7919703.

Vadhana Kumari, S., Paramasivan, B. Defense against Sybil attacks and authentication for anonymous location-based routing in MANET. Wireless Netw 23, 715–726 (2017). https://doi.org/10.1007/s11276-015-1178-7

K. Jayabarathan, J., Avaninathan, S. & Savarimuthu, R. QoS enhancement in MANETs using priority aware mechanism in DSR protocol. J Wireless Com Network 2016, 131 (2016). https://doi.org/10.1186/s13638-016-0629-x

Y. Xia, P. Jiang, G. Agrawal and R. Ramnath, "Scaling and Selecting GPU Methods for All Pairs Shortest Paths (APSP) Computations," 2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS), Lyon, France, 2022, pp. 190-200, doi: 10.1109/IPDPS53621.2022.00027.

M. Riyazuddin, M. J. Sadiq, R. Agrawal, S. K. Shukla, A. Rana and R. Singh, "A Proficient Attack Prediction using Hash Algorithm in Manet," 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS), Tashkent, Uzbekistan, 2022, pp. 705-710, doi:10.1109/ICTACS56270.2022.9988726.

Rajakumari, K, Punitha, P, Lakshmana Kumar, R, Suresh, C. Improvising packet delivery and reducing delay ratio in mobile ad hoc network using neighbor coverage-based topology control algorithm. Int J Commun Syst. 2022; 35(2):e4260. https://doi.org/10.1002/dac.4260.

B. S. Gouda and C. K. Behera, "A route discovery approach to finding an optimal path in MANET usia ng reverse reactive routing protocol," 2012 NATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION SYSTEMS, Durgapur, India, 2012, pp. 1-5, doi: 10.1109/NCCCS.2012.6413009.

Goyal, A. ., Kanyal, H. S. ., & Sharma, B. . (2023). Analysis of IoT and Blockchain Technology for Agricultural Food Supply Chain Transactions. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3), 234–241. https://doi.org/10.17762/ijritcc.v11i3.6342

Qureshi, D. I. ., & Patil, M. S. S. . (2022). Secure Sensor Node-Based Fusion by Authentication Protocol Using Internet of Things and Rfid. Research Journal of Computer Systems and Engineering, 3(1), 48–55. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/41

Juneja, V., Singh, S., Jain, V., Pandey, K.K., Dhabliya, D., Gupta, A., Pandey, D. Optimization-based data science for an IoT service applicable in smart cities (2023) Handbook of Research on Data-Driven Mathematical Modeling in Smart Cities, pp. 300-321.

Downloads

Published

21.09.2023

How to Cite

Majumder, S. ., Bhattacharyya, D. ., & Chakraborty, S. . (2023). Mitigation of Sybil Attack in Mobile Ad Hoc Network Using CRYPTO-DSR: A Novel Routing Protocol. International Journal of Intelligent Systems and Applications in Engineering, 11(4), 281–288. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3523

Issue

Section

Research Article