Skip to main content
Log in

RETRACTED ARTICLE: An efficient technique for mitigating stealthy attacks using MNDA in MANET

  • S.I. : Machine Learning Applications for Self-Organized Wireless Networks
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

This article was retracted on 13 December 2022

This article has been updated

Abstract

In mobile ad hoc networks, stealthy packet dropping is considered as a suite comprising four attacks, namely misrouting, control attacks, character designation and the conniving impact, that can be effectively propelled against mobile specially appointed systems. Stealthy packet dropping upsets the packets through malevolent conduct at a transitional node. This paper presents a novel stealthy assault location strategy for distinguishing packet misrouting in the constructed mobile ad hoc networks. Moreover, we propose a new algorithm called dynamic malicious node detection algorithm for identifying the stealthy attack nodes in mobile network environment. This is achieved in two stages. The first stage gathers additional information pertaining to the middle nodes and stores in a special table in the intermediate nodes. The second stage identifies the misbehaving nodes if any in a specified path. Finally, an alternate path is chosen to send the packets to fulfill the communication. Various performance criteria are evaluated for this work. The results of these analysis show that our proposed work is more efficient than the Bayesian linear model-based detection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Change history

References

  1. D’Apice C, Manzo R (2006) Calculation of predicted average packet delay and its application for flow control in data network. J Inf Optim Sci 27(2):411–423

    MATH  Google Scholar 

  2. Singh JP, Dutta P, Chakrabarti A (2014) Weighted delay prediction in mobile ad hoc network using fuzzy time series. Egypt Inform J 15:105–114

    Article  Google Scholar 

  3. Zafar S, Tariq H, Manzoor K (2016) Throughput and delay analysis of AODV, DSDV and DSR routing protocols in mobile ad hoc networks. Int J Comput Netw Appl 3(2):25–31

    Google Scholar 

  4. Elhoseny M, Tharwat A, Yuan X, Hassanien AE (2018) Optimizing K-coverage of mobile WSNs. Expert Syst Appl 92:142–153

    Article  Google Scholar 

  5. Elsayed W, Elhoseny M, Sabbeh S, Riad A (2017) Self-maintenance model for wireless sensor networks. Comput Electr Eng. https://doi.org/10.1016/j.compeleceng.2017.12.022

    Article  Google Scholar 

  6. Khalil I, Bagchi S (2011) Stealthy attacks in wireless ad hoc networks: detection and countermeasure. IEEE Trans Mob Comput 10(8):1096–1112

    Article  Google Scholar 

  7. Beshr FB, Ishaq AB, Aljabri S, Sheltami TR (2016) A guard node (GN) based technique against misbehaving nodes in MANET. J Ubiquitous Syst Pervasive Netw 7(1):13–17

    Article  Google Scholar 

  8. Khalil I (2008) MIMI: mitigating packet misrouting in locally-monitored multi-hop wireless ad hoc networks. In: IEEE GLOBECOM 2008—2008 IEEE global telecommunications conference, New Orleans, LO, pp 1–5

  9. Stoleru R, Wu H, Chenji H (2011) Secure neighbor discovery in mobile ad hoc networks. In: 2011 IEEE eighth international conference on mobile ad-hoc and sensor systems, Valencia, pp 35–42

  10. Čapkun S, Hamdi M, Hubaux JP (2001) GPS-free positioning in mobile ad-hoc networks. In: Proceedings of the 34th annual Hawaii international conference on system sciences, Maui, HI, USA, p 10

  11. Manickam JML, Muruganandam D (2015) A survey on attacks in wireless networks. Aust J Basic Appl Sci 9(21):72–78

    Google Scholar 

  12. Tuli H, Kumar S (2014) A review on delay prediction techniques in MANET. Int J Comput Appl 108(14):12–14

    Google Scholar 

  13. Aoki M, Oki E, Rojas-Cessa R (2010) Scheme to measure one-way delay variation with detection and removal of clock skew. In: 2010 International conference on high performance switching and routing, Richardson, TX, pp 159–164

  14. Saini R, Khari M (2011) Defining malicious behavior of a node and its defensive techniques in ad hoc networks. Int J Smart Sens Ad Hoc Netw 1(1):17–20

    Article  Google Scholar 

  15. Oo MZ, Othman M, O’Farrell T (2016) A proxy acknowledgement mechanism for TCP variants in mobile ad hoc networks. J Commun Netw 18(2):238–245

    Article  Google Scholar 

  16. Balakrishnan K, Deng J, Varshney VK (2005) TWOACK: preventing selfishness in mobile ad hoc networks. IEEE Wirel Commun Netw Confrence 4:2137–2142

    Google Scholar 

  17. Ojetunde B, Shibata N, Gao J (2017) Secure payment system utilizing MANET for disaster areas. IEEE Trans Syst Man Cybern Syst 99:1–13

    Google Scholar 

  18. Khan MS, Midi D, Khan MI, Bertino E (2017) Fine-grained analysis of packet loss in MANETs. IEEE Access 5:7798–7807

    Article  Google Scholar 

  19. Tsuda T, Komai Y, Hara T, Nishio S (2016) Top-k query processing and malicious node identification based on node grouping in MANETs. IEEE Access 4:993–1007

    Article  Google Scholar 

  20. Chang JM, Tsou PC, Woungang I, Chao HC, Lai CF (2015) Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach. IEEE Syst J 9(1):65–75

    Article  Google Scholar 

  21. Surendran S, Prakash S (2015) An ACO look-ahead approach to QOS enabled fault-tolerant routing in MANETs. China Commun 12(8):93–110

    Article  Google Scholar 

  22. Shabut AM, Dahal KP, Bista SK, Awan IU (2015) Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans Mob Comput 14(10):2101–2115

    Article  Google Scholar 

  23. Schweitzer N, Stulman A, Margalit RD, Shabtai A (2017) Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans Mob Comput 16(8):2174–2183

    Article  Google Scholar 

  24. Yi Z, Dohi T (2015) Toward highly dependable power-aware mobile ad hoc network-survivability evaluation framework. IEEE Access 3:2665–2676

    Article  Google Scholar 

  25. Mejri MN, Ben-Othman J (2017) GDVAN: a new greedy behavior attack detection algorithm for VANETs. IEEE Trans Mob Comput 16(3):759–771

    Article  Google Scholar 

  26. Paramasivan B, Prakash MJV, Kaliappan M (2015) Development of a secure routing protocol using game theory model in mobile ad hoc networks. J Commun Netw 17(1):75–83

    Article  Google Scholar 

  27. Ganapathy S, Kulothungan K, Muthurajkumar S, Vijayalakshmi M, Yogesh P, Kannan A (2013) Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J Wirel Commun Netw 271:1–16

    Google Scholar 

  28. Logambigai R, Ganapathy S, Kannan A (2018) Energy-efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Comput Electr Eng 68:62–75

    Article  Google Scholar 

  29. Selvi M, Velvizhy P, Ganapathy S, Khanna Nehemiah H, Kannan A (2017) A rule based delay constrained energy efficient routing technique for wireless sensor networks. Clust Comput. https://doi.org/10.1007/s10586-017-1191-y

    Article  Google Scholar 

  30. Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2017) An intelligent secured and energy efficient routing algorithm for MANETs. Wirel Pers Commun 96(2):1753–1769

    Article  Google Scholar 

  31. Zhang W, He X (2018) Stealthy attack detection and solution strategy for consensus-based distributed economic dispatch problem. Int J Electr Power Energy Syst 103:233–246

    Article  Google Scholar 

  32. Li W, Xie L, Wang Z (2018) A novel covert agent for stealthy attacks on industrial control systems using least squares support vector regression. J Electr Comput Eng. https://doi.org/10.1155/2018/7204939

    Article  MathSciNet  Google Scholar 

  33. Anakath AS, Rajakumar S, Ambika S (2017) Privacy preserving multi factor authentication using trust management. Clust Comput. https://doi.org/10.1007/s10586-017-1181-0

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Muruganandam.

Ethics declarations

Conflict of interest

The authors declared that they have no conflict of interest.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Muruganandam, D., Martin Leo Manickam, J. RETRACTED ARTICLE: An efficient technique for mitigating stealthy attacks using MNDA in MANET. Neural Comput & Applic 31 (Suppl 1), 15–22 (2019). https://doi.org/10.1007/s00521-018-3634-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-018-3634-7

Keywords

Navigation