Open Access Open Access  Restricted Access Subscription Access

Securing Service Discovery from Denial of Service Attack in Mobile Ad Hoc Network (MANET)


Affiliations
1 Department of Computer Science and Engineering, HKBK College of Engineering, Research Centre, VTU, Karnataka, India
 

Mobile Ad Hoc networks (MANET) are resource constrained and operate on the basis of mutual cooperation. As a result, service discovery is one of the essential services of MANET. Service discovery was integrated onto Ad Hoc on Demand Distance Vector (AODV) Routing protocol, since service discovery was best performed at the network layer with minimal control messages. But this integration echoes the security threats of AODV protocol onto the service discovery process. The security of AODV protocol has drawn ample attention and various studies and methodologies are proposed. But most of the proposed techniques either address the flooding attack or the black hole attack but addressing both these issues simultaneously has been a challenge. Since the nodes in the network are resource constrained achieving the security objective with minimal overhead is also a target that needs to be achieved. We propose a trust based methodology at the level of individual node, that avoids the denial of service attack by controlling both the packet dropping attack and the flooding attack of the service discovery extended AODV protocol. This scheme assists in the selection of a safe path between the consumer and the server by ensuring that a cooperative node with high trust is selected at every hop. The trust value of the non-cooperative or flooding nodes is decreased and is thus avoided from safe paths. With simulated experiments it is demonstrated that the proposed system has 4% lesser control message overhead, the service discovery ratio improved by 13% and the service discovery latency was also considerably reduced.

Keywords

Service Discovery, AODV, Flooding Attack, Packet Dropping Attack, Denial of Service, Sleep Deprivation.
User
Notifications
Font Size

  • Alex Varshavsky, Bradley Reid, Eyal de Lara walex,brad A Cross-Layer Approach to Service Discovery and Selection in MANETs, Department of Computer Science University of Toronto 2005 IEEE.
  • P.-W. Yau and C. J. Mitchell, “Security vulnerabilities in ad hoc networks,” in Proceedings of the 7th International Symposium on Communication Theory and Applications, 2003, pp. 99–104
  • A. Nadeem and M. P. Howarth, "A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks," in IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2027-2045, Fourth Quarter 2013, doi: 10.1109/SURV.2013.030713.00201.
  • M. Pirrete and R. Brooks, “The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defence”, International Journal of Distributed Sensor Networks, Vol.2, No.3, pp 267-287, 2006.
  • S. Kurosawa and A. Jamalipour, “Detecting Blackhole Attack on AODVbased Mobile Ad Hoc Networks by Dynamic Learning method”, International Journal of Network Security, Vol.5, No.3, pp 338-345, November2007.
  • J.Sen, M.Chandra, S.G. Harihara, H.Reddy and P.Balamuralidhar, “A Mechanism for Detection of Gray Hole Attacks in Mobile Ad Hoc Networks”, Proc. IEEE International Conference on Information Communication and Signal Processing ICICS, Singapore, Dec. 2007.
  • L. Tamilselvan and V. Sankaranarayanan, "Prevention of Blackhole Attack in MANET," The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007), Sydney, NSW, Australia, 2007, pp. 21-21, doi: 10.1109/AUSWIRELESS.2007.61.
  • Payal N. Raj and Prashant B. Swadas, “DPRAODV: A DYANAMIC LEARNING SYSTEM AGAINST BLACKHOLE ATTACK IN AODV BASED MANET “,International Journal of Computer Science Issues, Vol. 2, 2009,PP 54-59
  • V. Mohite and L. Ragha, "Cooperative Security Agents for MANET," 2012 World Congress on Information and Communication Technologies, Trivandrum, 2012, pp. 549-554, doi: 10.1109/WICT.2012.6409138.
  • K. S. Chavda and A. V. Nimavat, "Removal of black hole attack in AODV routing protocol of MANET," 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India, 2013, pp. 1-5, doi: 10.1109/ICCCNT.2013.6726832.
  • T. Varshney, T. Sharma and P. Sharma, "Implementation of Watchdog Protocol with AODV in Mobile Ad Hoc Network," 2014 Fourth International Conference on Communication Systems and Network Technologies, Bhopal, India, 2014, pp. 217-221, doi: 10.1109/CSNT.2014.50.
  • T. Shu and M. Krunz, "Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks," in IEEE Transactions on Mobile Computing, vol. 14, no. 4, pp. 813-828, 1 April 2015, doi: 10.1109/TMC.2014.2330818.
  • Vimal Kumar, Rakesh Kumar, An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network, Procedia Computer Science, Volume 48, 2015, Pages 472-479,ISSN 1877-0509, https://doi.org/10.1016/j.procs.2015.04.122.
  • S. Jain and A. Khuteta, "Detecting and overcoming blackhole attack in mobile Adhoc Network," 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), Noida, 2015, pp. 225-229, doi: 10.1109/ICGCIoT.2015.7380462.
  • Adwan Yasin, Mahmoud Abu Zant, "Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique", Wireless Communications and Mobile Computing, vol. 2018, Article ID 9812135, 10 pages, 2018. https://doi.org/10.1155/2018/9812135
  • Musale S.S., Dhende S.L., Shirbahadurkar S.D., Najan A.S. (2019) Gray Hole and Cooperative Attack Prevention Protocol for MANETs. In: Abraham A., Dutta P., Mandal J., Bhattacharya A., Dutta S. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 814. Springer, Singapore. https://doi.org/10.1007/978-981-13-1501-5_49
  • Ali H. Ahmed, Nagwa M. Omar, and Hosny M. Ibrahim, "Secured Service Discovery Technique in IoT," Journal of Communications, vol. 14, no. 1, pp. 40-46, 2019. Doi: 10.12720/jcm.14.1.40-46.
  • Mahmoud Abu Zant, Adwan Yasin, "Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)", Security and Communication Networks, vol. 2019, Article ID 8249108, 12 pages, 2019. https://doi.org/10.1155/2019/8249108.
  • Hwanseok Yang, "A Study on Improving Secure Routing Performance Using Trust Model in MANET", Mobile Information Systems, vol. 2020, Article ID 8819587, 17 pages, 2020. https:// doi.org/10.1155/2020/8819587.
  • Tripathy, B.K., Jena, S.K., Bera, P. et al. An Adaptive Secure and Efficient Routing Protocol for Mobile Ad Hoc Networks. Wireless Pers Commun 114, 1339–1370 (2020). https://doi.org/10.1007/s11277-020-07423-x
  • Ran, C., Yan, S., Huang, L. et al. An improved AODV routing security algorithm based on blockchain technology in ad hoc network. J Wireless Com Network 2021, 52 (2021). https://doi.org/10.1186/s13638-021-01938-y
  • A. M. El-Semary and H. Diab, "BP-AODV: Blackhole Protected AODV Routing Protocol for MANETs Based on Chaotic Map," in IEEE Access, vol. 7, pp. 95197-95211, 2019, doi: 10.1109/ACCESS.2019.2928804.
  • Y. Fu, G. Li, A. Mohammed, Z. Yan, J. Cao and H. Li, "A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks," 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), 2019, pp. 1431-1436, doi: 10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00259.
  • Muruganantham Ponnusamy, Dr. A. Senthilkumar, and Dr.R.Manikandan, “Detection of Selfish Nodes Through Reputation Model In Mobile Adhoc Network MANET’ Turkish Journal of Computer and Mathematics Education, Vol.12 No.9 (2021), 2404–2410.
  • Alaa Althalji, Souheil Khawatmi, Mohamed Khatib Improving the Security of AODV Protocol using V-Detector Algorithm, International Journal of Computer Applications (0975 –8887) Volume 177 –No. 17, November 2019
  • Ankit Kumar & Madhavi Sinha (2019) Design and analysis of an improved AODV protocol for black hole and flooding attack in vehicular ad-hoc network (VANET), Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 453-463, DOI: 10.1080/09720529.2019.1637151
  • Md Ibrahim Talukdar, Rosilah Hassan, Md Sharif Hossen, Khaleel Ahmad, Faizan Qamar, Amjed Sid Ahmed, "Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature", Wireless Communications and Mobile Computing, vol. 2021, 13 pages, 2021. https://doi.org/10.1155/2021/6693316.
  • N. Islam and Z. A. Shaikh, "A Novel Approach to Service Discovery in Mobile Adhoc Network," 2008 IEEE International Networking and Communications Conference, 2008, pp. 58-62, doi: 10.1109/INCC.2008.4562692.
  • Smitha Kurian, Loganathan R,International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-4, November 2019
  • Kurian, S., Ramasamy, L. Novel AODV based service discovery protocol for MANETS. Wireless Netw 27, 2497–2508 (2021). https://doi.org/10.1007/s11276-021-02596-0.
  • https://tools.ietf.org/html/rfc3561 accessed last on August 2021.

Abstract Views: 311

PDF Views: 1




  • Securing Service Discovery from Denial of Service Attack in Mobile Ad Hoc Network (MANET)

Abstract Views: 311  |  PDF Views: 1

Authors

Smitha Kurian
Department of Computer Science and Engineering, HKBK College of Engineering, Research Centre, VTU, Karnataka, India
Loganathan Ramasamy
Department of Computer Science and Engineering, HKBK College of Engineering, Research Centre, VTU, Karnataka, India

Abstract


Mobile Ad Hoc networks (MANET) are resource constrained and operate on the basis of mutual cooperation. As a result, service discovery is one of the essential services of MANET. Service discovery was integrated onto Ad Hoc on Demand Distance Vector (AODV) Routing protocol, since service discovery was best performed at the network layer with minimal control messages. But this integration echoes the security threats of AODV protocol onto the service discovery process. The security of AODV protocol has drawn ample attention and various studies and methodologies are proposed. But most of the proposed techniques either address the flooding attack or the black hole attack but addressing both these issues simultaneously has been a challenge. Since the nodes in the network are resource constrained achieving the security objective with minimal overhead is also a target that needs to be achieved. We propose a trust based methodology at the level of individual node, that avoids the denial of service attack by controlling both the packet dropping attack and the flooding attack of the service discovery extended AODV protocol. This scheme assists in the selection of a safe path between the consumer and the server by ensuring that a cooperative node with high trust is selected at every hop. The trust value of the non-cooperative or flooding nodes is decreased and is thus avoided from safe paths. With simulated experiments it is demonstrated that the proposed system has 4% lesser control message overhead, the service discovery ratio improved by 13% and the service discovery latency was also considerably reduced.

Keywords


Service Discovery, AODV, Flooding Attack, Packet Dropping Attack, Denial of Service, Sleep Deprivation.

References





DOI: https://doi.org/10.22247/ijcna%2F2021%2F209992