Safe Routing Approach by Identifying and Subsequently Eliminating the Attacks in MANET

Safe Routing Approach by Identifying and Subsequently Eliminating the Attacks in MANET

  IJETT-book-cover           
  
© 2022 by IJETT Journal
Volume-70 Issue-11
Year of Publication : 2022
Authors : S.M. Udhaya Sankar, D. Dhinakaran, C. Cathrin Deboral, M. Ramakrishnan
DOI : 10.14445/22315381/IJETT-V70I11P224

How to Cite?

S.M. Udhaya Sankar, D. Dhinakaran, C. Cathrin Deboral, M. Ramakrishnan, "Safe Routing Approach by Identifying and Subsequently Eliminating the Attacks in MANET," International Journal of Engineering Trends and Technology, vol. 70, no. 11, pp. 219-231, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I11P224

Abstract
Wireless networks that are decentralized and communicate without using existing infrastructure are known as mobile ad-hoc networks. The most common sorts of threats and attacks can affect MANETs. Therefore, it is advised to utilize intrusion detection, which controls the system to detect additional security issues. Monitoring is essential to avoid attacks and provide extra protection against unauthorized access. Although the current solutions have been designed to defeat the attack nodes, they still require additional hardware, have considerable delivery delays, do not offer high throughput or packet delivery ratios, or do not do so without using more energy. The capability of a mobile node to forward packets, which is dependent on the platform's life quality, may be impacted by the absence of the network node power source. We developed the Safe Routing Approach (SRA), which uses behaviour analysis to track and monitor attackers who discard packets during the route discovery process. The attacking node recognition system is made for irregular routing node detection to protect the controller network's usual properties from becoming recognized as an attack node. The suggested method examines the nearby attack nodes and conceals the trusted node in the routing pathway. The path is instantly assigned after the initial discovery of trust nodes based on each node's strength value. It extends the network's life span and reduces packet loss. In terms of Packet Delivery Ratio (PDR), energy consumption, network performance, and detection of attack nodes, the suggested approach is contrasted with AIS, ZIDS, and Improved AODV. The findings demonstrate that the recommended strategy performs superior in terms of PDR, residual energy, and network throughput.

Keywords
MANET, Intrusion Detection, Security, Routing, Attack Nodes, Trust Node.

Reference
[1] G. Li, F. Liu, A. Sharma, O. I. Khalaf, Y. Alotaibi, A. Alsufyani and S. Alghamdi, "Research on the Natural Language Recognition Method Based on Cluster Analysis using Neural Network," Mathematical Problems in Engineering, vol. 2021, 2021. Crossref, https://doi.org/10.1155/2021/9982305
[2] H. Xiong, "On the Design of Blockchain-Based ECDSA with Fault-Tolerant Batch Verification Protocol for Blockchain-Enabled Iomt," IEEE Journal of Biomedical and Health Informatics, vol. 26, no. 5 2022. Crossref, https://doi.org/10.1109/JBHI.2021.3112693
[3] Udhaya Sankar S.M, Ganesan R, Jeevaa Katiravan, Ramakrishnan M and Ruhin Kouser R, “Mobile Application Based Speech and Voice Analysis for COVID-19 Detection Using Computational Audit Techniques,” International Journal of Pervasive Computing and Communications, vol. 18, no. 5 2020. Crossref, https://doi.org/10.1108/IJPCC-09-2020-0150
[4] D. Dhinakaran, D. A. Kumar, S. Dinesh, D. Selvaraj and K. Srikanth, “Recommendation System for Research Studies Based on GCR,” International Mobile and Embedded Technology Conference (MECON), Noida, India, pp. 61-65, 2022. Crossref, https://doi.org/10.1109/MECON53876.2022.9751920
[5] Jena Catherine Bel D, Esther C, Zionna Sen G B,Tamizhmalar D, Dhinakaran D and Anish T. P, “Trustworthy Cloud Storage Data Protection based on Blockchain Technology,” International Conference on Edge Computing and Applications (ICECAA), pp. 538-543, 2022. . Crossref, https://doi.org/10.1109/ICECAA55415.2022.9936299
[6] Udhaya Sankar S.M, Christo M.S and Uma Priyadarsini P.S, “Secure and Energy Concise Route Revamp Technique in Wireless Sensor Networks,” Intelligent Automation and Soft Computing, vol. 35, no. 2, pp. 2337-2351, 2023. Crossref, https://doi.org/10.32604/iasc.2023.030278
[7] D. Dhinakaran, and P. M. Joe Prathap, “Preserving Data Confidentiality in Association Rule Mining using Data Share Allocator Algorithm,” Intelligent Automation & Soft Computing, vol. 33, no. 3, pp. 1877-1892, 2022. Crossref, https://doi.org/10.32604/iasc.2022.024509
[8] M. M. Mukhedkar and U. Kolekar, “E-TDGO: An Encrypted Trust-Based Dolphin Glowworm Optimization for Secure Routing in Mobile Ad Hoc Network,” International Journal of Communication Systems, vol. 33, no. 9, pp. e4252, 2020.
[9] M.Supriya and T.Adilakshmi, "Secure Routing using ISMO for Wireless Sensor Networks," SSRG International Journal of Computer Science and Engineering, vol. 8, no. 12, pp. 14-20, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSE-V8I12P103
[10] Sharma and L. Tharani, “Ant Colony, Based Node Disjoint Local Repair in Multipath Routing in MANET Network,” Wireless Personal Communications, pp. 1–28, 2021.
[11] Sankar, S.M, Chamundeeswari Vijaya and Katiravan Jeevaa, “Identity-Based Attack Detection and Manifold Adversaries Localization in Wireless Networks,” Journal of Theoretical and Applied Information Technology, vol. 67, no. 2, pp. 513-518, 2014.
[12] G. Suryanarayana, K. Chandran, O. I. Khalaf, Y. Alotaibi, A. Alsufyani, and S. A. Alghamdi, "Accurate Magnetic Resonance Image Super Resolution Using Deep Networks and Gaussian Filtering in the Stationary Wavelet Domain," IEEE Access, vol. 9, pp. 71406–71417, 2021. Crossref, https://doi.org/10.1109/ACCESS.2021.3077611
[13] Velusamy, K. Karunanithy, D. Sauveron, R. N. Akram, and J. Cho, “Multi-Objective Function-Based Node-Disjoint Multipath Routing for Mobile Ad Hoc Networks,” Electronics, vol. 10, no. 15, pp. 1781, 2021. Crossref, https://doi.org/10.3390/electronics10151781
[14] K. Sudharson, A. M. Sermakani, V. Parthipan, D. Dhinakaran, G. Eswari Petchiammal and N. S. Usha, “Hybrid Deep Learning Neural System for Brain Tumor Detection,” 2022 2nd International Conference on Intelligent Technologies (CONIT), pp. 1-6, 2022. Crossref, https://doi.org/10.1109/CONIT55038.2022.9847708
[15] J. Filipek and L. Hudec, “Security Architecture for the Mobile Ad Hoc Networks,” Journal of Electrical Engineering, vol. 69, no. 3, pp. 198–204, 2018. Crossref, https://doi.org/10.2478/jee-2018-0026
[16] R. A. Hamamreh, M. Ayyad, and M. Jamoos, "RAD: Reinforcement Authentication DYMO Protocol for MANET," in 2019 International Conference on Promising Electronic Technologies (ICPET), Gaza, pp. 136–141, 2019. Crossref, https://doi.org/10.1109/ICPET.2019.00032
[17] S. M. Zarei and R. Fotohi, "Defense Against Flooding Attacks using Probabilistic Thresholds in the Internet of Things Ecosystem," Security and Privacy, vol. 4, no. 3, pp. e152, 2021. Crossref, https://doi.org/10.48550/arXiv.2102.09805
[18] Vanathy and M. Ramakrishnan, "Signcryption Based Hyper Elliptical Curve Cryptography Framework for Key Escrow in Manet," International Journal of Advanced Research in Engineering and Technology (IJARET), vol. 11, no. 3, pp. 91–107, 2020. Crossref, http://dx.doi.org/10.31224/osf.io/nrm64
[19] S. Jamali and R. Fotohi, "Defending Against Wormhole Attack in MANET Using an Artificial Immune System," New Review of Information Networking, vol. 21, no. 2, pp. 79–100, 2016. Crossref, https://doi.org/10.1080/13614576.2016.1247741
[20] Y. Chen and A. Terzis, “On the Implications of the Log-Normal Path Loss Model: An Efficient Method to Deploy and Move Sensor Motes,” in Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems (SenSys'11), pp. 26–39, 2011. Crossref, https://doi.org/10.1145/2070942.2070946
[21] V. Sangeetha and S. S. Kumar, "ZIDS: Zonal-Based Intrusion Detection System for Studying the Malicious Node Behaviour in MANET," in Emerging Research in Electronics, Computer Science and Technology (ICERECT), Mandya, India, pp. 276–281, 2015. Crossref, https://doi.org/10.1109/ERECT.2015.7499026
[22] Yi Liu, Sahil Garg, Jiangtian Nie, Yang Zhang, Zehui Xiong, Jiawen Kang and M. Shamim Hossain., "Deep Anomaly Detection for Timeseries Data in Industrial Iot: A Communication-Efficient Ondevice Federated Learning Approach," IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6348–6358, 2020. Crossref, http://dx.doi.org/10.1109/JIOT.2020.3011726
[23] Sathiya and B. Gomathy, "Improved Security and Routing Path Learning in Manets Using Beer–Quiche Game Theoretical Model in Cloud Computing," Cluster Computing, vol. 22, pp. 21–31, 2019. Crossref, http://dx.doi.org/10.1007/s10586-017-1599-4
[24] N. Tamilarasi and S. G. Santhi, “Detection of Wormhole Attack and Secure Path Selection in Wireless Sensor Network,” Wireless Personal Communications, vol. 114, no. 1, pp. 329–345, 2020. Crossref, https://doi.org/10.1007/s11277-020-07365-4
[25] C. Ran, S. Yan, L. Huang and L. Zhang, “An Improved AODV Routing Security Algorithm Based on Blockchain Technology in Ad Hoc Network,” EURASIP Journal on Wireless Communications and Networking, vol. 2021, no. 1, pp. 1–16, 2021. Crossref, https://doi.org/10.1186/s13638-021-01938-y.
[26] Sankar S.M.U, Revathi S.T and Thiagarajan R, "Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes," Computer Systems Science and Engineering, vol. 45, no. 1, pp. 625-640, 2023.
[27] S. Wang, "Multipath Routing Based on Genetic Algorithm in Wireless Sensor Networks," Mathematical Problems in Engineering, vol. 2021, 2021. Crossref, https://doi.org/10.1155/2021/4815711
[28] R. Rajeswari, K. Kulothungan, S. Ganapathy and A. Kannan, "A Trusted Fuzzy Based Stable and Secure Routing Algorithm for Effective Communication in Mobile Adhoc Networks," Peer-to-Peer Networking and Applications, vol. 12, no. 5, pp. 1076–1096, 2019. Crossref, https://doi.org/10.1007/s12083-019-00766-8
[29] P. Sathyaraj and D. Rukmani Devi, "Retracted Article: Designing the Routing Protocol with Secured Iot Devices and Qos Over Manet using Trust-Based Performance Evaluation Method," Computing, vol. 12, no. 7, pp. 6987–6995, 2021.
[30] D. Dhinakaran, M. R. Khanna, S. P. Panimalar, A. T. P, S. P. Kumar and K. Sudharson, "Secure Android Location Tracking Application with Privacy Enhanced Technique," 2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT), pp. 223-229, 2022. Crossref, https://doi.org/10.1109/CCiCT56684.2022.00050
[31] Sujithra, T. and Sumathi, Dr. M. and Ramakrishnan, M. and Sankar, S. M. Udhaya, “Id Based Adaptive-Key Signcryption for Data Security in Cloud Environment,” International Journal of Advanced Research in Engineering and Technology (IJARET), vol. 11, no. 4, pp. 167-182, 2020.
[32] X. Liu, A. Liu, T. Wang, K. Ota, M. Dang and Y. Liu, Z. Cai, "Adaptive Data and Verified Message Disjoint Security Routing for Gathering Big Data in Energy Harvesting Networks," Journal of Parallel and Distributed Computing, vol. 135, pp. 140–155, 2020. Crossref, https://doi.org//10.1016/j.jpdc.2019.08.012
[33] Dharini, N., Katiravan, J., Sankar and S.M.U., "Wireless Sensor Network-based Detection of Poisonous Gases Using Principal Component Analysis," Computer Systems Science and Engineering, vol. 44, no. 1, pp. 249-264, 2022. Crossref, https://doi.org/10.32604/csse.2023.024419
[34] Udhaya Sankar S.M, Abinaya R, Karunya Jeez S and Sunju R, “Efficient Data Transmission Technique for Transmitting the Diagnosed Signals and Images in WBSN,” 4th International Conference on Recent Trends in Computer Science and Technology, ICRTCST 2021 - Proceedings, pp. 251–256, 2022. Crossref, https://doi.org/10.1109/ICRTCST54752.2022.9781867
[35] Dhinakaran D and Joe Prathap P. M, "Protection of Data Privacy from Vulnerability Using Two-Fish Technique With Apriori Algorithm In Data Mining," The Journal of Supercomputing, vol. 78, no. 16, pp. 17559-17593, 2022. Crossref, https://doi.org/10.1007/s11227-022-045170
[36] M. Farkhana, A. A. Hanan, H. Suhaidi, K. A. Tajudin and Z. K. Zuhairi, "Energy Conservation of Content Routing through Wireless Broadcast Control in NDN Based MANET: A Review," Journal of Network and Computer Applications, vol. 131, pp. 109–132, 2019. Crossref, https://doi.org/10.1016/j.jnca.2019.01.004
[37] B. S. Eddine, O. Smail, B. Meftah, M. Rebbah and B. Cousin, "An Efficient Energy Aware Link Stable Multipath Routing Protocol for Mobile Ad Hoc Networks In Urban Areas," Telfor Journal, vol. 12, no. 1, pp. 2–7, 2020. Crossref, https://doi.org/10.5937/telfor2001002E
[38] P. Kirubanantham, Udhaya Sankar, S.M, C. Amuthadevi, M. Baskar, M. Senthil Raja and P. C. Karthik, “An Intelligent Web Service Group-Based Recommendation System For Long-Term Composition,” Journal of Supercomputing, vol. 78, pp. 1944-1960, 2022. Crossref, https://doi.org/10.1007/s11227-021-03930-1
[39] Ananth T S, Baskar M, Udhaya Sankar S M, R. Thiagarajan, Arul Dalton G, Pasupuleti Raja Rajeshwari, Aruru Sai Kumar and Suresh A, “Evaluation of Low Power Consumption Network on Chip Routing Architecture,” Microprocessors and Microsystems, vol. 82, 2021. Crossref, https://doi.org/10.1016/j.micpro.2020.103809
[40] D. Dhinakaran, P.M. Joe Prathap, D. Selvaraj, D. Arul Kumar, and B. Murugeshwari, “Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing,” International Journal of Engineering Trends and Technology, vol. 70, no. 3, pp. 284-294, 2022. Crossref, https://doi.org/10.14445/22315381/IJETT-V70I3P232
[41] Sujithra, T. Sumathi, Dr. M. Ramakrishnan, M. Sankar and S. M. Udhaya, “Survey on Data Security in Cloud Environment,” International Journal of Advanced Research in Engineering and Technology (IJARET), vol. 11, no. 4, pp. 155-166, 2020.
[42] C. Mohammad Sirajuddin and R. A. Prasad, "A Novel Key Management Technique for Secure Data Communication by Reducing Packet Dropping and Energy Consumption in MANET," Viticultural Science and Technique, vol. 34, pp. 2416– 3953, 2019.
[43] S. V. Kumar and V. Anuratha, “Energy Efficient Routing for MANET using Optimized Hierarchical Routing Algorithm (Ee-Ohra),” International Journal of Scientific & Technology Research, vol. 9, no. 2, pp. 2157–2162, Feb. 2020.
[44] Dhinakaran D, Selvaraj D, Udhaya Sankar S.M, Pavithra S and Boomika R, “Assistive System for the Blind with Voice Output Based on Optical Character Recognition, International Conference on Innovative Computing and Communications,” Lecture Notes in Networks and Systems, Springer, Singapore, vol. 492 2023. Crossref, https://doi.org/10.1007/978-981-19-3679-1_1
[45] T. V. S. Kumar and D. P. G. Benakop, "A Secure Routing Protocol for MANET Using Neighbor Node Discovery and Multi Detection Routing Protocol," International Journal of Engineering Trends and Technology, vol. 68, no. 7, pp. 50–55, 2020. Crossref, https://doi.org/10.14445/22315381/IJETT-V68I7P208S
[46] G. Gomathy, P. Kalaiselvi, D. Selvaraj, D. Dhinakaran, A. T. P and D. Arul Kumar, "Automatic Waste Management based on IoT using a Wireless Sensor Network," 2022 International Conference on Edge Computing and Applications (ICECAA), pp. 629-634, 2022. Crossref, https://doi.org/10.1109/ICECAA55415.2022.9936351
[47] Bhardwaj and H. El-Ocla, "Multipath Routing Protocol Using Genetic Algorithm in Mobile Ad Hoc Networks," IEEE Access, vol. 8, pp. 177534–177548, 2020. Crossref, https://doi.org/10.1109/ACCESS.2020.3027043