Abstract
In mobile ad hoc networks, stealthy packet dropping is considered as a suite comprising four attacks, namely misrouting, control attacks, character designation and the conniving impact, that can be effectively propelled against mobile specially appointed systems. Stealthy packet dropping upsets the packets through malevolent conduct at a transitional node. This paper presents a novel stealthy assault location strategy for distinguishing packet misrouting in the constructed mobile ad hoc networks. Moreover, we propose a new algorithm called dynamic malicious node detection algorithm for identifying the stealthy attack nodes in mobile network environment. This is achieved in two stages. The first stage gathers additional information pertaining to the middle nodes and stores in a special table in the intermediate nodes. The second stage identifies the misbehaving nodes if any in a specified path. Finally, an alternate path is chosen to send the packets to fulfill the communication. Various performance criteria are evaluated for this work. The results of these analysis show that our proposed work is more efficient than the Bayesian linear model-based detection.
Similar content being viewed by others
Change history
13 December 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s00521-022-08152-x
References
D’Apice C, Manzo R (2006) Calculation of predicted average packet delay and its application for flow control in data network. J Inf Optim Sci 27(2):411–423
Singh JP, Dutta P, Chakrabarti A (2014) Weighted delay prediction in mobile ad hoc network using fuzzy time series. Egypt Inform J 15:105–114
Zafar S, Tariq H, Manzoor K (2016) Throughput and delay analysis of AODV, DSDV and DSR routing protocols in mobile ad hoc networks. Int J Comput Netw Appl 3(2):25–31
Elhoseny M, Tharwat A, Yuan X, Hassanien AE (2018) Optimizing K-coverage of mobile WSNs. Expert Syst Appl 92:142–153
Elsayed W, Elhoseny M, Sabbeh S, Riad A (2017) Self-maintenance model for wireless sensor networks. Comput Electr Eng. https://doi.org/10.1016/j.compeleceng.2017.12.022
Khalil I, Bagchi S (2011) Stealthy attacks in wireless ad hoc networks: detection and countermeasure. IEEE Trans Mob Comput 10(8):1096–1112
Beshr FB, Ishaq AB, Aljabri S, Sheltami TR (2016) A guard node (GN) based technique against misbehaving nodes in MANET. J Ubiquitous Syst Pervasive Netw 7(1):13–17
Khalil I (2008) MIMI: mitigating packet misrouting in locally-monitored multi-hop wireless ad hoc networks. In: IEEE GLOBECOM 2008—2008 IEEE global telecommunications conference, New Orleans, LO, pp 1–5
Stoleru R, Wu H, Chenji H (2011) Secure neighbor discovery in mobile ad hoc networks. In: 2011 IEEE eighth international conference on mobile ad-hoc and sensor systems, Valencia, pp 35–42
Čapkun S, Hamdi M, Hubaux JP (2001) GPS-free positioning in mobile ad-hoc networks. In: Proceedings of the 34th annual Hawaii international conference on system sciences, Maui, HI, USA, p 10
Manickam JML, Muruganandam D (2015) A survey on attacks in wireless networks. Aust J Basic Appl Sci 9(21):72–78
Tuli H, Kumar S (2014) A review on delay prediction techniques in MANET. Int J Comput Appl 108(14):12–14
Aoki M, Oki E, Rojas-Cessa R (2010) Scheme to measure one-way delay variation with detection and removal of clock skew. In: 2010 International conference on high performance switching and routing, Richardson, TX, pp 159–164
Saini R, Khari M (2011) Defining malicious behavior of a node and its defensive techniques in ad hoc networks. Int J Smart Sens Ad Hoc Netw 1(1):17–20
Oo MZ, Othman M, O’Farrell T (2016) A proxy acknowledgement mechanism for TCP variants in mobile ad hoc networks. J Commun Netw 18(2):238–245
Balakrishnan K, Deng J, Varshney VK (2005) TWOACK: preventing selfishness in mobile ad hoc networks. IEEE Wirel Commun Netw Confrence 4:2137–2142
Ojetunde B, Shibata N, Gao J (2017) Secure payment system utilizing MANET for disaster areas. IEEE Trans Syst Man Cybern Syst 99:1–13
Khan MS, Midi D, Khan MI, Bertino E (2017) Fine-grained analysis of packet loss in MANETs. IEEE Access 5:7798–7807
Tsuda T, Komai Y, Hara T, Nishio S (2016) Top-k query processing and malicious node identification based on node grouping in MANETs. IEEE Access 4:993–1007
Chang JM, Tsou PC, Woungang I, Chao HC, Lai CF (2015) Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach. IEEE Syst J 9(1):65–75
Surendran S, Prakash S (2015) An ACO look-ahead approach to QOS enabled fault-tolerant routing in MANETs. China Commun 12(8):93–110
Shabut AM, Dahal KP, Bista SK, Awan IU (2015) Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans Mob Comput 14(10):2101–2115
Schweitzer N, Stulman A, Margalit RD, Shabtai A (2017) Contradiction based gray-hole attack minimization for ad-hoc networks. IEEE Trans Mob Comput 16(8):2174–2183
Yi Z, Dohi T (2015) Toward highly dependable power-aware mobile ad hoc network-survivability evaluation framework. IEEE Access 3:2665–2676
Mejri MN, Ben-Othman J (2017) GDVAN: a new greedy behavior attack detection algorithm for VANETs. IEEE Trans Mob Comput 16(3):759–771
Paramasivan B, Prakash MJV, Kaliappan M (2015) Development of a secure routing protocol using game theory model in mobile ad hoc networks. J Commun Netw 17(1):75–83
Ganapathy S, Kulothungan K, Muthurajkumar S, Vijayalakshmi M, Yogesh P, Kannan A (2013) Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J Wirel Commun Netw 271:1–16
Logambigai R, Ganapathy S, Kannan A (2018) Energy-efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Comput Electr Eng 68:62–75
Selvi M, Velvizhy P, Ganapathy S, Khanna Nehemiah H, Kannan A (2017) A rule based delay constrained energy efficient routing technique for wireless sensor networks. Clust Comput. https://doi.org/10.1007/s10586-017-1191-y
Muthurajkumar S, Ganapathy S, Vijayalakshmi M, Kannan A (2017) An intelligent secured and energy efficient routing algorithm for MANETs. Wirel Pers Commun 96(2):1753–1769
Zhang W, He X (2018) Stealthy attack detection and solution strategy for consensus-based distributed economic dispatch problem. Int J Electr Power Energy Syst 103:233–246
Li W, Xie L, Wang Z (2018) A novel covert agent for stealthy attacks on industrial control systems using least squares support vector regression. J Electr Comput Eng. https://doi.org/10.1155/2018/7204939
Anakath AS, Rajakumar S, Ambika S (2017) Privacy preserving multi factor authentication using trust management. Clust Comput. https://doi.org/10.1007/s10586-017-1181-0
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declared that they have no conflict of interest.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Muruganandam, D., Martin Leo Manickam, J. RETRACTED ARTICLE: An efficient technique for mitigating stealthy attacks using MNDA in MANET. Neural Comput & Applic 31 (Suppl 1), 15–22 (2019). https://doi.org/10.1007/s00521-018-3634-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-018-3634-7