Mitigation of Wormhole attack in MANET Using Cryptic-AODV: A Modified Routing Protocol

Authors

  • Sayan Majumder The Heritage Academy, Kolkata–700107, India
  • Debika Bhattacharyya Institute of Engineering & Management, Kolkata–700091, India
  • Subhalaxmi Chakraborty University of Engineering & Management, Kolkata–700160, India

Keywords:

AODV, PDR, Throughput, Wormhole

Abstract

Mobile Ad-hoc Networks (MANETs) inherently possess dynamic topologies, so their vulnerability to various security threats is a critical concern. While a variety of routing protocols and strategies have been developed to detect and mitigate Wormhole attacks in MANETs, a novel approach is presented in the form of the hash function-based AODV protocol within this research study. We introduce a new cryptographic Ad-Hoc on Demand Distance Vector (AODV) routing protocol known as CRYPTIC-AODV. To establish routes from source to destination, we utilize Dijkstra's algorithm to calculate the shortest path. The data packets are then safeguarded within the network nodes using a hash function technique. Upon decryption, if the data packets are validated, they are subsequently forwarded from one node to the next until they reach the destination. In our comparative analysis, we assessed the performance of our modified AODV protocol against existing protocols, namely, DSR, DSDV, and ZRP. Our findings demonstrate that the crypto-based AODV protocol offers enhanced security and efficiency while being environmentally conscious, as evidenced by improved throughput, reduced end-to-end delay, and increased data transfer success rates, especially in the presence of Wormhole attacks.

Downloads

Download data is not yet available.

References

M. Bharti, S. Rani and P. Singh, "Security Attacks in MANET: A Complete Analysis," 2022 6th International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India, 2022, pp. 384- 387, doi: 10.1109/ICDCS54290.2022.9780760.

A. Hameed and A. Al-Omary, "Survey of blackhole attack on MANET," 2nd Smart Cities Symposium (SCS 2019), Bahrain, Bahrain, 2019, pp. 1-4, doi: 10.1049/cp.2019.0224.

P. K. Sharma and V. Sharma, "Survey on security issues in MANET: Wormhole detection and prevention," 2016 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, 2016, pp. 637-640, doi: 10.1109/CCAA.2016.7813799.

S. Kaur, R. Kaur and A. K. Verma, "Jellyfish attack in MANETs: A review," 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Coimbatore, India, 2015, pp. 1-5, doi: 10.1109/ICECCT.2015.7226168.

Gautam, D., Tokekar, V. (2020). Pattern-Based Detection and Mitigation of DoS Attacks in MANET Using SVM-PSO. In: Pandit, M., Srivastava, L., Venkata Rao, R., Bansal, J. (eds) Intelligent Computing Applications for Sustainable Real-World Systems. ICSISCET 2019. Proceedings in Adaptation, Learning and Optimization, vol 13. Springer, Cham. https://doi.org/10.1007/978-3-030-44758-8_16.

Ávila, K., Sanmartin, P., Jabba, D. et al. An analytical Survey of Attack Scenario Parameters on the Techniques of Attack Mitigation in WSN. Wireless Pers Commun 122, 3687–3718 (2022). https://doi.org/10.1007/s11277-021-09107-6

Almesaeed, R., Al-Salem, E. Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks. Wireless Netw 28, 1361–1374 (2022). https://doi.org/10.1007/s11276-021-02871-0

Abolfazl Mehbodniya, Julian L. Webber, Mohammad Shabaz, Hamidreza Mohafez & Kusum Yadav (2021)Machine Learning Technique to Detect Sybil Attack on IoT Based Sensor Network, IETE Journal of Research, DOI: 10.1080/03772063.2021.2000509

C. Sharma and R. Vaid, "A Novel Sybil Attack Detection and Prevention Mechanism for Wireless Sensor Networks," 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC), Solan, India, 2021, pp. 340-345, doi 10.1109/ISPCC53510.2021.9609450.

A. Sharma, D. Bhuriya and U. Singh, "Secure data transmission on MANET by hybrid cryptography technique," 2015 International Conference on Computer, Communication and Control (IC4), Indore, India, 2015, pp. 1-6, doi: 10.1109/IC4.2015.7375688.

R. K. Kapur and S. K. Khatri, "Secure data transfer in MANET using symmetric and asymmetric cryptography," 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), Noida, India, 2015, pp. 1-5, doi:10.1109/ICRITO.2015.7359293.

Kumar, Chaitanya & Basit, Abdul & Singh, Priyadarshi & Venkaiah, Vadlamudi. (2018). Lightweight cryptography for distributed PKI-based MANETS. International Journal of Computer Networks and Communications. 10. 10.5121/ijcnc.2018.10207.

P. D. Nikam and V. Raut, "Improved MANET Security Using Elliptic Curve Cryptography and EAACK," 2015 International Conference on Computational Intelligence and Communication Networks (CICN), Jabalpur, India, 2015, pp. 1125-1129, doi: 10.1109/CICN.2015.221.

Muruganandam, S. , Srinivasan, N. and Sivaprakasam, A. 2022. An Intelligent Method forIntrusion Detection and Prevention in Mobile AdHoc Networks. International Journal of Intelligent Systems and Applications in Engineering. 10, 3 (Oct. 2022), 154–160.

T. Poongodi, M. S. Khan, R. Patan, A. H. Gandomi and B. Balusamy, "Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks," in IEEE Access, vol. 7, pp. 18409-18419, 2019, doi: 10.1109/ACCESS.2019.2896001.

Allahham, Alaa & Mohammed, Muamer. (2017). A MODIFIED ROUTE DISCOVERY APPROACH FOR DYNAMIC SOURCE ROUTING (DSR) PROTOCOL IN MOBILE AD-HOC NETWORKS. International Journal of Software Engineering and Computer Systems. 3. 17-30.10.15282/ijsecs.3.2017.2.0024.

S. S. Jathe and V. Dhamdhere, "Hybrid Cryptography for Malicious Behavior Detection and Prevention System for MANETs," 2015 International Conference on Computational Intelligence and Communication Networks (CICN), Jabalpur, India, 2015, pp. 1108-1114, doi: 10.1109/CICN.2015.218.

Bang, A.O., Rao, U.P. A novel decentralized security architecture against Sybil attack in RPL-based IoT networks: a focus on smart home use case. J Supercomput 77, 13703–13738 (2021). https://doi.org/10.1007/s11227-021-03816-2.

Lucindia Dupak and Subhasish Banerjee. 2022. Hybrid trust and weight evaluation-based trust assessment using ECK-ANFIS and AOMDV-REPO-based optimal routing in a MANET environment. J. Supercomput. 78, 15 (Oct 2022), 17074–17094. https://doi.org/10.1007/s11227-022-04530-3.

S. Anitha and B. M. Ramesh, "Network Reconfiguration for Loss Minimization by Using Johnson's Algorithm," 2018 4th International Conference on Electrical Energy Systems (ICEES), Chennai, India, 2018, pp. 680-684, doi: 10.1109/ICEES.2018.8442416.

Shanmuganathan, C, Boopalan, K, Elangovan, G, Sathish Kumar, P. Enabling security in MANETs using an efficient cluster-based group key management with elliptical curve cryptography in consort with sail fish optimization algorithm. Trans Emerging Tel Tech. 2023; 34( 3):e4717.doi:10.1002/ett.4717.

Zhang, D, Liu, S, Liu, X, Zhang, T, Cui, Y. Novel dynamic source routing protocol (DSR) based on genetic algorithm-bacterial foraging optimization (GA-BFO). Int J Commun Syst. 2018; 31:e3824. https://doi.org/10.1002/dac.3824

A. Maheswary and S. Baskar, "Letter to shape encryption for securing MANET routing protocols," 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Chennai, India, 2016, pp. 1-4, doi: 10.1109/ICCIC.2016.7919703.

Vadhana Kumari, S., Paramasivan, B. Defense against Sybil attacks and authentication for anonymous location-based routing in MANET. Wireless Netw 23, 715–726 (2017). https://doi.org/10.1007/s11276-015-1178-7

K. Jayabarathan, J., Avaninathan, S. & Savarimuthu, R. QoS enhancement in MANETs using priority aware mechanism in DSR protocol. J Wireless Com Network 2016, 131 (2016). https://doi.org/10.1186/s13638-016-0629-x

Y. Xia, P. Jiang, G. Agrawal and R. Ramnath, "Scaling and Selecting GPU Methods for All Pairs Shortest Paths (APSP) Computations," 2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS), Lyon, France, 2022, pp. 190-200, doi: 10.1109/IPDPS53621.2022.00027.

M. Riyazuddin, M. J. Sadiq, R. Agrawal, S. K. Shukla, A. Rana and R. Singh, "A Proficient Attack Prediction using Hash Algorithm in Manet," 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS), Tashkent, Uzbekistan, 2022, pp. 705-710, doi:10.1109/ICTACS56270.2022.9988726.

Rajakumari, K, Punitha, P, Lakshmana Kumar, R, Suresh, C. Improvising packet delivery and reducing delay ratio in mobile ad hoc network using neighbour coverage-based topology control algorithm. Int J Commun Syst. 2022; 35( 2):e4260. https://doi.org/10.1002/dac.4260

B. S. Gouda and C. K. Behera, "A route discovery approach to finding an optimal path in MANET usia ng reverse reactive routing protocol," 2012 NATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION SYSTEMS, Durgapur, India, 2012, pp. 1-5, doi: 10.1109/NCCCS.2012.6413009.

V. R. Ghorpade, Y. V. Joshi, and R. R. Manthalkar. 2009. Efficient public key authentication in MANET. In Proceedings of the International Conference on Advances in Computing, Communication and Control (ICAC3 '09). Association for Computing Machinery, New York, NY, USA, 106–112. https://doi.org/10.1145/1523103.1523126

S. Majumder and D. Bhattacharyya, "Mitigating wormhole attack in MANET using absolute deviation statistical approach," 2018 IEEE 8th Annual Computing and Communication Workshop and 49 Conference (CCWC), Las Vegas, NV, USA, 2018, pp. 317-320, doi: 10.1109/CCWC.2018.8301780. 50

Majumder, S., Bhattacharyya, D. (2020). Improvement of Packet Delivery Fraction Due to Discrete Attacks in MANET Using MAD Statistical Approach. In: Mandal, J., Mukhopadhyay, S. (eds) Proceedings of the Global AI Congress 2019. Advances in Intelligent Systems and Computing, vol 1112. Springer, Singapore. https://doi.org/10.1007/978-981-15-2188-1_15

Majumder, S. (2020). Improvement of Packet Delivery Fraction Due to Wormhole Attack by Modified DSR and AODV Algorithm. In: Mandal, J., Mukhopadhyay, S. (eds) Proceedings of the Global AI Congress 2019. Advances in Intelligent Systems and Computing, vol 1112. Springer, Singapore. https://doi.org/10.1007/978-981-15-2188-1_7

A. Kushwaha and H. Sharma, "Enhancing Selective Encryption Algorithm for Secured MANET," 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation, Kuantan, Malaysia, 2012, pp. 326-329, doi: 10.1109/CIMSim.2012.16.

Majumder, S., Bhattacharyya, D. (2020). Relation Estimation of Packets Dropped by Wormhole Attack to Packets Sent Using Regression Analysis. In: Mandal, J., Bhattacharya, D. (eds) Emerging Technology in Modelling and Graphics. Advances in Intelligent Systems and Computing, vol 937. Springer, Singapore. https://doi.org/10.1007/978-981-13-7403-6_49.

K. N. Dattatraya and K. Raghava Rao, “Hybrid based cluster head selection for maximizing network lifetime and energy efficiency in WSN,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 3, pp. 716–726, 2022.

N. V. Patil, C. R. Krishna, K. Kumar and S. Behal, “E-Had: A distributed and collaborative detection framework for early detection of DDoS attacks,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 4, pp. 1373–1387, 202

N. Veeraiah and B. T. Krishna, “Trust-aware FuzzyClus-fuzzy NB: Intrusion detection scheme based on fuzzy clustering and Bayesian rule,” Wireless Networks, vol. 25, pp. 4021–4035, 2019.

M. S. Shaik and F. Mira, “A comprehensive mechanism of manet network layer based security attack prevention,” International Journal of Wireless and Microwave Technologies, vol. 10, no. 1, pp. 38–47, 2020.

Downloads

Published

25.12.2023

How to Cite

Majumder, S. ., Bhattacharyya, D. ., & Chakraborty, S. . (2023). Mitigation of Wormhole attack in MANET Using Cryptic-AODV: A Modified Routing Protocol. International Journal of Intelligent Systems and Applications in Engineering, 12(1), 619–627. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4095

Issue

Section

Research Article