Mitigation of Wormhole attack in MANET Using Cryptic-AODV: A Modified Routing Protocol
Keywords:
AODV, PDR, Throughput, WormholeAbstract
Mobile Ad-hoc Networks (MANETs) inherently possess dynamic topologies, so their vulnerability to various security threats is a critical concern. While a variety of routing protocols and strategies have been developed to detect and mitigate Wormhole attacks in MANETs, a novel approach is presented in the form of the hash function-based AODV protocol within this research study. We introduce a new cryptographic Ad-Hoc on Demand Distance Vector (AODV) routing protocol known as CRYPTIC-AODV. To establish routes from source to destination, we utilize Dijkstra's algorithm to calculate the shortest path. The data packets are then safeguarded within the network nodes using a hash function technique. Upon decryption, if the data packets are validated, they are subsequently forwarded from one node to the next until they reach the destination. In our comparative analysis, we assessed the performance of our modified AODV protocol against existing protocols, namely, DSR, DSDV, and ZRP. Our findings demonstrate that the crypto-based AODV protocol offers enhanced security and efficiency while being environmentally conscious, as evidenced by improved throughput, reduced end-to-end delay, and increased data transfer success rates, especially in the presence of Wormhole attacks.
Downloads
References
M. Bharti, S. Rani and P. Singh, "Security Attacks in MANET: A Complete Analysis," 2022 6th International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India, 2022, pp. 384- 387, doi: 10.1109/ICDCS54290.2022.9780760.
A. Hameed and A. Al-Omary, "Survey of blackhole attack on MANET," 2nd Smart Cities Symposium (SCS 2019), Bahrain, Bahrain, 2019, pp. 1-4, doi: 10.1049/cp.2019.0224.
P. K. Sharma and V. Sharma, "Survey on security issues in MANET: Wormhole detection and prevention," 2016 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, 2016, pp. 637-640, doi: 10.1109/CCAA.2016.7813799.
S. Kaur, R. Kaur and A. K. Verma, "Jellyfish attack in MANETs: A review," 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, 2015, pp. 1-5, doi: 10.1109/ICECCT.2015.7226168.
Gautam, D., Tokekar, V. (2020). Pattern-Based Detection and Mitigation of DoS Attacks in MANET Using SVM-PSO. In: Pandit, M., Srivastava, L., Venkata Rao, R., Bansal, J. (eds) Intelligent Computing Applications for Sustainable Real-World Systems. ICSISCET 2019. Proceedings in Adaptation, Learning and Optimization, vol 13. Springer, Cham. https://doi.org/10.1007/978-3-030-44758-8_16.
Ávila, K., Sanmartin, P., Jabba, D. et al. An analytical Survey of Attack Scenario Parameters on the Techniques of Attack Mitigation in WSN. Wireless Pers Commun 122, 3687–3718 (2022). https://doi.org/10.1007/s11277-021-09107-6
Almesaeed, R., Al-Salem, E. Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks. Wireless Netw 28, 1361–1374 (2022). https://doi.org/10.1007/s11276-021-02871-0
Abolfazl Mehbodniya, Julian L. Webber, Mohammad Shabaz, Hamidreza Mohafez & Kusum Yadav (2021)Machine Learning Technique to Detect Sybil Attack on IoT Based Sensor Network, IETE Journal of Research, DOI: 10.1080/03772063.2021.2000509
C. Sharma and R. Vaid, "A Novel Sybil Attack Detection and Prevention Mechanism for Wireless Sensor Networks," 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC), Solan, India, 2021, pp. 340-345, doi 10.1109/ISPCC53510.2021.9609450.
A. Sharma, D. Bhuriya and U. Singh, "Secure data transmission on MANET by hybrid cryptography technique," 2015 International Conference on Computer, Communication and Control (IC4), Indore, India, 2015, pp. 1-6, doi: 10.1109/IC4.2015.7375688.
R. K. Kapur and S. K. Khatri, "Secure data transfer in MANET using symmetric and asymmetric cryptography," 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), Noida, India, 2015, pp. 1-5, doi:10.1109/ICRITO.2015.7359293.
Kumar, Chaitanya & Basit, Abdul & Singh, Priyadarshi & Venkaiah, Vadlamudi. (2018). Lightweight cryptography for distributed PKI-based MANETS. International Journal of Computer Networks and Communications. 10. 10.5121/ijcnc.2018.10207.
P. D. Nikam and V. Raut, "Improved MANET Security Using Elliptic Curve Cryptography and EAACK," 2015 International Conference on Computational Intelligence and Communication Networks (CICN), Jabalpur, India, 2015, pp. 1125-1129, doi: 10.1109/CICN.2015.221.
Muruganandam, S. , Srinivasan, N. and Sivaprakasam, A. 2022. An Intelligent Method forIntrusion Detection and Prevention in Mobile AdHoc Networks. International Journal of Intelligent Systems and Applications in Engineering. 10, 3 (Oct. 2022), 154–160.
T. Poongodi, M. S. Khan, R. Patan, A. H. Gandomi and B. Balusamy, "Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks," in IEEE Access, vol. 7, pp. 18409-18419, 2019, doi: 10.1109/ACCESS.2019.2896001.
Allahham, Alaa & Mohammed, Muamer. (2017). A MODIFIED ROUTE DISCOVERY APPROACH FOR DYNAMIC SOURCE ROUTING (DSR) PROTOCOL IN MOBILE AD-HOC NETWORKS. International Journal of Software Engineering and Computer Systems. 3. 17-30.10.15282/ijsecs.3.2017.2.0024.
S. S. Jathe and V. Dhamdhere, "Hybrid Cryptography for Malicious Behavior Detection and Prevention System for MANETs," 2015 International Conference on Computational Intelligence and Communication Networks (CICN), Jabalpur, India, 2015, pp. 1108-1114, doi: 10.1109/CICN.2015.218.
Bang, A.O., Rao, U.P. A novel decentralized security architecture against Sybil attack in RPL-based IoT networks: a focus on smart home use case. J Supercomput 77, 13703–13738 (2021). https://doi.org/10.1007/s11227-021-03816-2.
Lucindia Dupak and Subhasish Banerjee. 2022. Hybrid trust and weight evaluation-based trust assessment using ECK-ANFIS and AOMDV-REPO-based optimal routing in a MANET environment. J. Supercomput. 78, 15 (Oct 2022), 17074–17094. https://doi.org/10.1007/s11227-022-04530-3.
S. Anitha and B. M. Ramesh, "Network Reconfiguration for Loss Minimization by Using Johnson's Algorithm," 2018 4th International Conference on Electrical Energy Systems (ICEES), Chennai, India, 2018, pp. 680-684, doi: 10.1109/ICEES.2018.8442416.
Shanmuganathan, C, Boopalan, K, Elangovan, G, Sathish Kumar, P. Enabling security in MANETs using an efficient cluster-based group key management with elliptical curve cryptography in consort with sail fish optimization algorithm. Trans Emerging Tel Tech. 2023; 34( 3):e4717.doi:10.1002/ett.4717.
Zhang, D, Liu, S, Liu, X, Zhang, T, Cui, Y. Novel dynamic source routing protocol (DSR) based on genetic algorithm-bacterial foraging optimization (GA-BFO). Int J Commun Syst. 2018; 31:e3824. https://doi.org/10.1002/dac.3824
A. Maheswary and S. Baskar, "Letter to shape encryption for securing MANET routing protocols," 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Chennai, India, 2016, pp. 1-4, doi: 10.1109/ICCIC.2016.7919703.
Vadhana Kumari, S., Paramasivan, B. Defense against Sybil attacks and authentication for anonymous location-based routing in MANET. Wireless Netw 23, 715–726 (2017). https://doi.org/10.1007/s11276-015-1178-7
K. Jayabarathan, J., Avaninathan, S. & Savarimuthu, R. QoS enhancement in MANETs using priority aware mechanism in DSR protocol. J Wireless Com Network 2016, 131 (2016). https://doi.org/10.1186/s13638-016-0629-x
Y. Xia, P. Jiang, G. Agrawal and R. Ramnath, "Scaling and Selecting GPU Methods for All Pairs Shortest Paths (APSP) Computations," 2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS), Lyon, France, 2022, pp. 190-200, doi: 10.1109/IPDPS53621.2022.00027.
M. Riyazuddin, M. J. Sadiq, R. Agrawal, S. K. Shukla, A. Rana and R. Singh, "A Proficient Attack Prediction using Hash Algorithm in Manet," 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS), Tashkent, Uzbekistan, 2022, pp. 705-710, doi:10.1109/ICTACS56270.2022.9988726.
Rajakumari, K, Punitha, P, Lakshmana Kumar, R, Suresh, C. Improvising packet delivery and reducing delay ratio in mobile ad hoc network using neighbour coverage-based topology control algorithm. Int J Commun Syst. 2022; 35( 2):e4260. https://doi.org/10.1002/dac.4260
B. S. Gouda and C. K. Behera, "A route discovery approach to finding an optimal path in MANET usia ng reverse reactive routing protocol," 2012 NATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION SYSTEMS, Durgapur, India, 2012, pp. 1-5, doi: 10.1109/NCCCS.2012.6413009.
V. R. Ghorpade, Y. V. Joshi, and R. R. Manthalkar. 2009. Efficient public key authentication in MANET. In Proceedings of the International Conference on Advances in Computing, Communication and Control (ICAC3 '09). Association for Computing Machinery, New York, NY, USA, 106–112. https://doi.org/10.1145/1523103.1523126
S. Majumder and D. Bhattacharyya, "Mitigating wormhole attack in MANET using absolute deviation statistical approach," 2018 IEEE 8th Annual Computing and Communication Workshop and 49 Conference (CCWC), Las Vegas, NV, USA, 2018, pp. 317-320, doi: 10.1109/CCWC.2018.8301780. 50
Majumder, S., Bhattacharyya, D. (2020). Improvement of Packet Delivery Fraction Due to Discrete Attacks in MANET Using MAD Statistical Approach. In: Mandal, J., Mukhopadhyay, S. (eds) Proceedings of the Global AI Congress 2019. Advances in Intelligent Systems and Computing, vol 1112. Springer, Singapore. https://doi.org/10.1007/978-981-15-2188-1_15
Majumder, S. (2020). Improvement of Packet Delivery Fraction Due to Wormhole Attack by Modified DSR and AODV Algorithm. In: Mandal, J., Mukhopadhyay, S. (eds) Proceedings of the Global AI Congress 2019. Advances in Intelligent Systems and Computing, vol 1112. Springer, Singapore. https://doi.org/10.1007/978-981-15-2188-1_7
A. Kushwaha and H. Sharma, "Enhancing Selective Encryption Algorithm for Secured MANET," 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation, Kuantan, Malaysia, 2012, pp. 326-329, doi: 10.1109/CIMSim.2012.16.
Majumder, S., Bhattacharyya, D. (2020). Relation Estimation of Packets Dropped by Wormhole Attack to Packets Sent Using Regression Analysis. In: Mandal, J., Bhattacharya, D. (eds) Emerging Technology in Modelling and Graphics. Advances in Intelligent Systems and Computing, vol 937. Springer, Singapore. https://doi.org/10.1007/978-981-13-7403-6_49.
K. N. Dattatraya and K. Raghava Rao, “Hybrid based cluster head selection for maximizing network lifetime and energy efficiency in WSN,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 3, pp. 716–726, 2022.
N. V. Patil, C. R. Krishna, K. Kumar and S. Behal, “E-Had: A distributed and collaborative detection framework for early detection of DDoS attacks,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 4, pp. 1373–1387, 202
N. Veeraiah and B. T. Krishna, “Trust-aware FuzzyClus-fuzzy NB: Intrusion detection scheme based on fuzzy clustering and Bayesian rule,” Wireless Networks, vol. 25, pp. 4021–4035, 2019.
M. S. Shaik and F. Mira, “A comprehensive mechanism of manet network layer based security attack prevention,” International Journal of Wireless and Microwave Technologies, vol. 10, no. 1, pp. 38–47, 2020.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.