Abstract
In MANETs, secured communication is considered as a key application. There have been many attempts reported in literature for enhancing security in MANETs. The way of preventing several attacks have been employed so far among which adverting collaborative attacks has become the serious challenge. The nodes which launch collaborative attacks have been detected and eliminated using Collaborative Bait Detection Scheme (CBDS). However, CBDS has failed to enhance the security against the jellyfish attacks which subsequently affect the routing protocol due to poor packet transmission caused by malicious nodes. The present work describes the improved approach for secured transmission by introducing ant colony optimization based clustered based routing protocol (ACO-CBRP). In this method, the clustering of nodes is done using proposed ACO based approach in which the node’s trust value determines routing performance. The nodes having the appropriate trust values enable the calculation of the trust tables of the MANET for detecting the jellyfish attacks. During the process of data transmission, enhanced security can be assured by means of secured key management. The performance evaluation of the present approach is done based on different metrics such as lifetime, overhead and packet delivery ratio using NS-2 simulator platform. The obtained result implies the better performance of the proposed ACO-CBRP approach in mitigating jellyfish attacks.



Similar content being viewed by others
References
Eichler, S., Roman, C.: Challenges of secure routing in MANETs: a simulative approach using AODV-SEC. In: 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 481–484 (2006)
Kant, L., Young, K., Younis, O., Shallcross, D., Sinkar, K., Mcauley, A., Graff, C.: Network science based approaches to design and analyze MANETs for military applications. IEEE Commun. Mag. 46(11), 55–61 (2008)
Ci, S., Guizani, M., Chen, H.H., Sharif, H.: Self-regulating network utilization in mobile ad hoc wireless networks. IEEE Trans. Veh. Technol. 55(4), 1302–1310 (2006)
Taneja, S., Kush, A.: A survey of routing protocols in mobile ad hoc networks. Int. J. Innov. Manag. Technol. 1(3), 279 (2010)
Maan, F., Mazhar, N.: MANET routing protocols vs mobility models: a performance evaluation. In: 2011 Third International Conference on Ubiquitous and Future Networks (ICUFN), pp. 179–184 (2011)
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561) (2003)
Clausen, T., Jacquet, P.: Optimized link state routing protocol (OLSR) (No. RFC 3626) (2003)
Shevtekar, A., Anantharam, K., Ansari, N.: Low rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett. 9(4), 363–365 (2005)
Merwe, J.V.D., Dawoud, D., McDonald, S.: A survey on peer-to-peer key management for mobile ad hoc networks. ACM Comput. Surv. (CSUR) 39(1), 1 (2007)
Bhargava, B., de Oliveira, R., Zhang, Y., Idika, N.C.: Addressing collaborative attacks and defense in ad hoc wireless networks. In: 29th IEEE International Conference on Distributed Computing Systems Workshops, 2009. ICDCS Workshops’ 09, pp. 447–450 (2009)
Chang, J.M., Tsou, P.C., Woungang, I., Chao, H.C., Lai, C.F.: Defending against collaborative attacks by malicious nodes in MANETs: a cooperative bait detection approach. IEEE Syst. J. 9(1), 65–75 (2015)
Weerasinghe, H., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation. In: Future Generation Communication and Networking (FGCN 2007), Vol. 2, pp. 362–367 (2007)
Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Netw. 6(1), 32–46 (2008)
Chen, G., Li, C., Ye, M., Wu, J.: An unequal cluster-based routing protocol in wireless sensor networks. Wirel. Netw. 15(2), 193–207 (2009)
Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad Hoc Networks. In: Paper Presented at the 5th European Personal Mobile Communications Conference, Glasgow, UK, pp. 22–25 (2003)
Al-Shurman, M., Yoo, S-M., Park, S.: Black hole attack in mobile ad hoc networks. In: Paper Presented at the 42nd Annual ACM Southeast Regional Conference (ACM-SE’42), Huntsville, Alabama, 2–3 April 2004
Kozma, W., Lazos, L.: REAct: Resource-efficient accountability for node misbehavior in ad hoc networks based on random audits. In: Paper Presented at the Second ACM Conference on Wireless Network Security, Zurich, Switzerland, pp. 16–18 (2009)
Yu, C.W., Wu, T-K., Cheng, R.H, Chang, S.C.: A distributed and cooperative black hole node detection and elimination mechanism for ad hoc network. In: Paper Presented at the PAKDD Workshops, Nanjing, China, 22–25 May 2007
Wang, W., Bhargava, B., Linderman, M.: Defending against collaborative packet drop attacks on MANETs. In: Paper Presented at the 2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS 2009) (in Conjunction with IEEE SRDS 2009), New York, USA, 27 September 2009
Min, Z., Jiliu, Z.: Cooperative black hole attack prevention for mobile ad hoc networks. In: Paper Presented at the International Symposium on Information Engineering and Electronic Commerce, Ternopil, Ukraine, 16–17 May 2009
Tsou, P-C., Chang, J-M., Lin, Y-H., Chao, H-C., Chen, J-L.: Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs. In: Paper Presented at the 13th International Conference on Advanced Communication Technology, Phoenix Park, Korea, pp. 13–16 (2011)
Dahill, B., Levine, B., Royer, E., Shields, C.: A secure routing protocol for ad hoc networks. Tech report 02-32, Department of Computer Science, University of Massachusetts, Amherst (2001)
Papadimitratos, P., Haas, Z.: Secure routing for mobile ad hoc networks. In: Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS) (2002)
Hu, Y., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of INFOCOM (2003)
Capkun, S., Buttyan, L., Hubaux, J.: Sector: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the ACM workshop on security of ad hoc and sensor networks (2003)
Kianpisheh, S., Charkari, N.M.: Ant colony based constrained workflow scheduling for heterogeneous computing systems. Clust. Comput. 19(3), 1053–1070 (2016)
Yi, S., Naldurg, P., Kravets, R.: Integrating quality of protection into ad hoc routing protocols. In: Proceedings of the 6th World Multi-conference on Systemics, Cybernetics and Informatics (SCI 2002), pp. 286–292 (2002)
Buchegger, S., Le Boudec, J.: Performance analysis of the CONFIDANT protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02), pp. 226–236 (2002)
Yu, W., Sun, Y., Liu, K.J.R.: HADOF: defense against routing disruptions in mobile ad hoc networks. In: Proceedings of the IEEE INFOCOM, pp. 1252–1261 (2005)
Rajaram, A., Palaniswami, D.S.: Malicious node detection system for mobile ad hoc networks. Int. J. Comput. Sci. Inf. Technol. 1(2), 77–85 (2010)
Kaur, A., Wadhwa, D.S.: Effects of jelly fish attack on mobile ad-hoc network’s routing protocols. IJERA 2248(9622), 1694–1700 (2013)
Laxmi, V., Lal, C., Gaur, M.S., Mehta, D.: JellyFish attack: analysis, detection and countermeasure in TCP-based MANET. J. Inf. Secur. Appl. 22, 99–112 (2015)
Al-Karaki, J., Kamal, A., Ul-Mustafa, R.: On the optimal clustering in mobile ad hoc networks. In: First IEEE Consumer Communications and Networking Conference, 2004. CCNC, pp. 71–76 (2004)
Pirzada, A.A., McDonald, C.: Establishing trust in pure ad-hoc networks. In: Proceedings of the 27th Australian Conference on Computer Science (ACSC’04), Dunedin, New Zealand, pp. 47– 54 (2004)
Li, X., Lyu, M. R., Liu, J.: A trust model based routing protocol for secure ad hoc networks. In: Proceedings 2004 IEEE Aerospace Conference, Big Sky, MT, USA, pp. 1286–1295 (2004)
Lee, S., Su, W., Gerla, M.: On-demand multicast routing protocol in multihop wireless mobile networks. In: ACM/Baltzer Mobile Networks and Applications, A Special Issue on Multipoint Communication in Wireless Mobile Networks, vol. 7, pp. 441–453 (2002)
Hu, B., Qian, H., Shen, Y., Yan, J.: An optimal path finding strategy in networks based on random walk. Clust. Comput. 19(4), 2179–2188 (2016)
Varatharajan, R., Manogaran, G., Priyan, M. K., Revathi sundarasekar.: Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust. Comput 1–10 (2017)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Satheeshkumar, S., Sengottaiyan, N. Defending against jellyfish attacks using cluster based routing protocol for secured data transmission in MANET. Cluster Comput 22 (Suppl 5), 10849–10860 (2019). https://doi.org/10.1007/s10586-017-1202-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1202-z