Skip to main content

Advertisement

Log in

Black hole detection using evolutionary algorithm for IDS/IPS in MANETs

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Mobile ad hoc network (MANET) is a self organized structure of mobile nodes which are distributed unevenly in the environment. There are various MANET routing protocols exist which cannot stand against the security issues which might occur inside or outside of the MANET environment. Black hole attack is most popular insider attack happening on the MANET environment which needs to be concerned more to avoid the unwanted packet loss. These problems are resolved in the proposed research method by introducing new method namely hybridization of particle swarm optimization with genetic algorithm (HPSO-GA) routing system. The main contribution of this research method is to detect the black hole attack (BHA) by utilizing ad hoc on demand distance vector (AODV) routing protocol. This method utilizes the data routing information (DRI) of the neighbouring nodes instead of considering source node information. DRI information are gathered from every neighbouring nodes which increases the probability of attack detection accuracy. The suggested HPSO-GA routing mechanism researches the black hole attack in MANET, at that point, the outputs were measured utilizing the parameters namely detection rate, false positive alarm (FPA), packet delivery ratio (PDR), routing overhead, average end to end delay and throughput. The outcomes are contrasted with existing techniques, like, AODV, local intrusion detection (LID) with AODV. Simulation output utilizing the network simulator demonstrates that the improvement ratio of the throughput picked up by HPSO-GA security routing mechanism and general improvement reduction at end-to-end delay and routing overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Aniruddha, C.: Ontology for MANET Security Threats, pp. 171–176. PROC. NCON, Krishnankoil, Tamil Nadu (2005)

    Google Scholar 

  2. Taneja, S., Kush, A.: A Survey of routing protocols in mobile ad hoc networks. Int. J. Innov. Manage Technol. 1(3), 279–285 (2010)

    Google Scholar 

  3. Kaur, K., Singh, E.N.: A survey of intrusion detection techniques. Int. J. 3(6), 402–406 (2013)

    Google Scholar 

  4. Saini, A., Kumar, H.: Effect of black hole attack on AODV routing protocol in MANET. Int. J. Comput. Technol. (IJCST) 1(2), 1–4 (2010)

    Google Scholar 

  5. Das, R., Purkayastha, B.S., Das, P.: Security measures for black hole attack in MANET: an approach. arXiv preprint arXiv:1206.3764, pp. 1–7. (2012)

  6. Wa’el, M.M., Agiza, H.N., Radwan, E.: Intrusion detection using rough sets based parallel genetic algorithm hybrid model. In: Proceedings of the World Congress on Engineering and Computer Science, vol. 2, pp. 20–22 (2009)

  7. Lee, S.M., Kim, D.S., Park, J.S.: A survey and taxonomy of lightweight intrusion detection systems. J. Internet Serv. Inf. Secur. 2(1/2), 119–131 (2012)

    Google Scholar 

  8. Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1–35 (2010)

    Article  Google Scholar 

  9. Himral, L., Vig, V., Chand, N.: Preventing aodv routing protocol from black hole attack. Int. J. Eng. Sci. Technol. (IJEST) 3(5), 3927–3932 (2011)

    Google Scholar 

  10. Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J., Nygard, K.E.: Prevention of cooperative black hole attack in wireless Ad Hoc networks. In: International Conference on Wireless Networks, pp. 570–575 (2003)

  11. Tamilselvan, L., Sankaranarayanan, V.: Prevention of blackhole attack in MANET. In: The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, pp. 21 (2007)

  12. Weerasinghe, H., Fu, H.: Preventing cooperative black hole attacks in mobile ad hoc networks: simulation implementation and evaluation. In: Future generation communication and networking (FGCN 2007), vol. 2, pp. 362–367. (2007)

  13. Medadian, M., Mebadi, A., Shahri, E.: Combat with black hole attack in AODV routing protocol. In: IEEE 9th Malaysia International Conference on Communications (MICC), pp. 530–535 (2009)

  14. Shurman, M.A., Yoo, S.M., Park, S.: Black hole attack in wireless ad hoc networks. In: Proceedings of the ACM 42nd Southeast Conference (ACMSE’04), pp. 96–97 (2004)

  15. Raza, I., Hussain, S.A: A trust based security framework for pure AODV network. In: International Conference on Information and Emerging Technologies, pp. 1–6 (2007)

  16. Tan, S., Kim, K.: Secure route discovery for preventing black hole attacks on AODV-based MANETs. In: High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), pp. 1159–1164 (2013)

  17. Khandelwal, V., Goyal, D.: Black hole attack and detection method for AODV routing protocol in MANETs. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET). 2, 1555–1559 (2013)

    Google Scholar 

  18. Naganjaneyulu, P.V., Prasad, K.S., Reddy, B.R., Suresh, A., Subbaiah, K.V., Reddy, B.E., Furkhat, T.: An adaptive blind channel estimation of OFDM system by worst case H∞ approach. Int. J. Hybrid Inf. Technol. 2(4), 1–6 (2009)

    Google Scholar 

  19. Kennedy, J.: Particle swarm optimization. Encyclopedia of Machine Learning, pp. 760–766. Springer, New York (2011)

    Google Scholar 

  20. Lin, C.C., Lee, Y.J.: Stacking sequence optimization of laminated composite structures using genetic algorithm with local improvement. Compos. Struct. 63(3), 339–345 (2004)

    Article  Google Scholar 

  21. Yang, X., Yuan, J., Yuan, J., Mao, H.: A modified particle swarm optimizer with dynamic adaptation. Appl. Math. Comput. 189(2), 1205–1213 (2007)

    MathSciNet  MATH  Google Scholar 

  22. Kao, Y.T., Zahara, E.: A hybrid genetic algorithm and particle swarm optimization for multimodal functions. Appl. Soft Comput. 8(2), 849–857 (2008)

    Article  Google Scholar 

  23. Goldberg, D.E.: Genetic Algorithms. New Delhi, Pearson Education India (2006)

    Google Scholar 

  24. Chen, S.: Particle swarm optimization with pbest crossover. In: The IEEE Congress on Evolutionary Computation-CEC2012, Brisbane, Australia. pp. 57–63 (2012)

  25. Wu, B., Chen, J., Wu, J., Cardei, M.: A survey of attacks and countermeasures in mobile ad hoc networks. Wireless Network Security, pp. 103–135. Springer, New York (2007)

    Chapter  Google Scholar 

  26. Abdelhaq, M., Serhan S., Alsaqour R., Hassan, R.: A local intrusion detection routing security over MANET network. In: International Conference on Electrical Engineering and Informatics (ICEEI), pp. 1–6 (2011)

Download references

Acknowledgements

The authors thank SASTRA Deemed University management for its constant motivation towards research. I wish to express my gratitude to Dr. A.Umamakeswari, Associate Dean, Department of CSE, School of Computing, SASTRA UNIVERSITY whose supervision & guidance in this research work has been carried out. I strongly believe that without her guidance and constant supervision it is not possible for me to complete this research paper successfully.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Thanuja.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thanuja, R., Umamakeswari, A. Black hole detection using evolutionary algorithm for IDS/IPS in MANETs. Cluster Comput 22 (Suppl 2), 3131–3143 (2019). https://doi.org/10.1007/s10586-018-2006-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2006-5

Keywords

Navigation