Skip to main content
Log in

Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

A power aware detection procedure for securing mobile ad hoc networks (MANETs) against packet forwarding misbehavior attack is introduced. Packet forwarding misbehavior attack is one of the security attacks in which malicious nodes make MANETs weak by showing packet dropping misconduct. The proposed protocol is named as power aware malicious detection for security (PAMDS) protocol. The feature of power aware is desirable to prolong MANET lifetime as under certain conditions, it is impracticable to replace or recharge the nodes’ batteries. The protocol employs intrusion detection system (IDS) for the detection and exclusion of the nodes inducing packet forwarding misbehavior attack in the network. The detection procedure reacts quickly in detecting and isolating malicious nodes. The detection procedure is power aware as only a small set of nodes that have enough energy and that cover the entire network are selected for running IDS. Also, IDS nodes are not required to work in promiscuous listening mode 100% of the time, this further saves power. PAMDS protocol emphasizes on security of the mobile ad hoc environment and power saving of the battery powered hand held devices. The protocol has been extensively simulated using network simulator NS-2. The findings indicate that PAMDS protocol is effective in terms of power saving, quick malicious node isolation and packet delivery ratio percentage.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  • Ahila E, Chitra K (2014) Security based energy efficient routing protocol for adhoc network. In: Proceedings of IEEE international conference on control, instrumentation, communication and computational technologies (ICCICCT), pp 1522–1526. ISBN: 978-1-4799-4191-9

  • Ahmed A, Bakar KA, Channa MI, Haseeb K, Khan AW (2016) A trust aware routing protocol for energy constrained wireless sensor network. Telecommun Syst 61:123–140. doi:10.1007/s11235-015-0068-8

    Article  Google Scholar 

  • Asadi M, Zimmerman C, Agah A (2013) A game theoretic approach to security and power conservation in wireless sensor networks. Int J Netw Secur 15:50–58

    Google Scholar 

  • Banergee S (2008) Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks. In: Proceedings of the world congress on engineering and computer science (WCECS 2008), WCECS, San Francisco, USA, pp 337–342. ISBN: 978-988-98671-0-2

  • Biswas S, Nag T, Neogy S (2014) Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. In: Proceedings of IEEE applications and innovations in mobile computing (AIMoC), pp 157–164. doi:10.1109/AIMOC.2014.6785535. ISBN: 978-1-4799-3881-0

  • Buchegger S, Boudec J Y L (2002) Performance analysis of the CONFIDANT protocol. In: Proceedings of 3rd ACM international symposium on mobile ad hoc networking and computing (MobiHoc ’02), Lausanne, Switzerland, pp 226–236. doi:10.1145/513800.513828. ISBN: 1-58113-501-7

  • Cano J C, Kim D (2002) Investigating performance of power-aware routing protocols for mobile ad-hoc networks. In: Proceedings of the international workshop on mobility and wireless access (MobiWac 2002), IEEE Computer Society, Washington, DC, USA, pp 80–86. doi:10.1109/MOBWAC.2002.1166956. ISBN: 0-7695-1843-5

  • Dhurandher S K, Woungang I, Traore I (2014) C-SCAN: an energy-efficient network layer security protocol for mobile ad hoc networks. In: Proceedings of 28th IEEE international conference on advanced information networking and applications workshops (WAINA), pp 530–535. doi:10.1109/WAINA.2014.85. ISBN: 978-1-4799-2654-1

  • Estahbanati M M, Rasti M, Hamami S M S (2014) A mobile ad hoc network routing based on energy and Markov chain trust. In: Proceedings of IEEE 7th international symposium on telecommunications (IST), pp 596–601. doi:10.1109/ISTEL.2014.7000775

  • Ghander A, Shaaban E (2015) Power aware cooperation enforcement MANET routing protocols. Procedia Comput Sci 73:162–171. doi:10.1016/j.procs.2015.12.062

    Article  Google Scholar 

  • Gong P, Chen TM, Xu Q (2015) ETARP: An energy efficient trust-aware routing protocol for wireless sensor networks. J Sens. doi:10.1155/2015/469793

  • Gonzalez OF, Howarth M, Pavlou G (2008) Detection and accusation of packet forwarding misbehavior in mobile ad hoc networks. J Internet Eng 2:181–192

    Google Scholar 

  • Heena, Kumar N (2014) Battery power and trust based routing strategy for MANET. In: Proceedings of IEEE international conference on advanced communication control and computing technologies (ICACCCT), pp 1559–1562. doi:10.1109/ICACCCT.2014.7019368. ISBN: 978-1-4799-3915-2

  • Hu YC, Johnson DB, Perrig A (2003) SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Netw 1:175–192. doi:10.1016/S1570-8705(03)00019-2

    Article  Google Scholar 

  • Hu YC, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11:38. doi:10.1007/s11276-004-4744-y

    Article  Google Scholar 

  • Jain H R, Sharma S K (2014) Improved energy efficient secure multipath AODV routing protocol for MANET. In: Proceedings of IEEE international conference on advances in engineering and technology research (ICAETR), pp 1–9. doi:10.1109/ICAETR.2014.7012847

  • Johnson D B, Maltz D A (1996) Dynamic source routing in ad hoc wireless networks. In: Mobile computing, the Kluwer International series in engineering and computer science, vol 353, Springer, US, pp 153–218. doi:10.1007/978-0-585-29603-6_5. ISBN: 978-0-7923-9697-0

  • Li J, Cordes D, Zhang J (2005) Power-aware routing protocols in ad hoc wireless networks. IEEE Wirel Commun 12:69–81. doi:10.1109/MWC.2005.1561947

    Article  Google Scholar 

  • Li Y, Peng S, Chu W (2006) An efficient algorithm for finding an almost connected dominating set of small size on wireless ad hoc networks. In: Proceedings of 2006 IEEE international conference on mobile adhoc and sensor systems (MASS), pp 199–205. doi:10.1109/MOBHOC.2006.278557. ISBN: 1-4244-0506-8

  • Lu Y, Zhong Y, Bhargava B (2003) Packet loss in mobile ad hoc networks. Computer Science Technical Reports, Paper 1558, Department of Computer Science, Purdue University. Report Number: 03-009. http://docs.lib.purdue.edu/cstech/1558

  • Marti S, Giuli T J, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of sixth annual international conference on mobile computing and networking (MobiCom ’00), Boston, USA, pp 255–265. doi:10.1145/345910.345955. ISBN:1-58113-197-6

  • Misra S, Dhurandher SK, Obaidat MS, Gupta P, Verma K, Narula P (2010) An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks. J Syst Softw 83:2188–2199. doi:10.1016/j.jss.2010.06.025

    Article  Google Scholar 

  • Mohanapriya M, Krishnamurthi I (2014) Modified DSR protocol for detection and removal of selective black hole attack in MANET. Comput Electr Eng 40:530–538. doi:10.1016/j.compeleceng.2013.06.001

    Article  Google Scholar 

  • Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection and prevention approaches for network layer attacks. IEEE Commun Surv Tutor 15:2027–2045. doi:10.1109/SURV.2013.030713.00201

    Article  Google Scholar 

  • Network simulator 2 (NS–2). http://www.isi.edu/nsnam/ns/. Accessed 13 Nov 2016

  • Perrig A, Canetti R, Tygar J D, Song D (2000) Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of IEEE symposium on security and privacy, Berleley, USA. doi:10.1109/SECPRI.2000.848446. ISBN: 1081-6011

  • Sarkar S, Datta R (2012) A trust based protocol for energy-efficient routing in self-organized MANETs. In: Proceedings of annual IEEE India Conference (INDICON), pp 1084–1089. doi:10.1109/INDCON.2012.6420778. ISBN: 978-1-4673-2270-6

  • Sarkar S, Datta R (2014) A secure and energy-efficient stochastic routing protocol for wireless mobile ad-hoc networks. In: Proceedings of IEEE twentieth national conference on communications (NCC), pp 1–6. doi:10.1109/NCC.2014.6811358. ISBN: 978-1-4799-2363-2

  • Sarkar S, Datta R (2016) A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Netw 37:209–227. doi:10.1016/j.adhoc.2015.08.020

    Article  Google Scholar 

  • Sheu JP, Chao CM, Hu WK, Sun CW (2007) A clock synchronization algorithm for multihop wireless ad hoc networks. Wirel Pers Commun 43:185–200. doi:10.1007/s11277-006-9217-4

    Article  Google Scholar 

  • Sridhar S, Baskaran R, Chandrasekar P (2013) Energy supported AODV (EN-AODV) for QoS routing in MANET, In: Proceedings of the 2nd international conference on integrated information (IC-ININFO 2012), Budapest, Hungary, vol 73 of Procedia—Social and Behavioral Sciences, pp 294–301. doi:10.1016/j.sbspro.2013.02.055

  • Su MY (2011) Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput Commun 34:107–117. doi:10.1016/j.comcom.2010.08.007

    Article  Google Scholar 

  • Subramaniam S, Ramachandran R (2014) Energy-and trust-based AODV for quality-of-service affirmation in MANETs. In: Artificial intelligence and evolutionary algorithms in engineering systems, vol 324 of the series advances in intelligent systems and computing. Springer India, pp 601–607. doi:10.1007/978-81-322-2126-5_65. ISBN: 978-81-322-2125-8

  • Tan S, Li X, Dong Q (2015) Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw 30:84–98. doi:10.1016/j.adhoc.2015.03.004

    Article  Google Scholar 

  • Vazifehdan J, Prasad RV, Onur E, Niemegeers I (2011) Energy-aware routing algorithms for wireless ad hoc networks with heterogeneous power supplies. Comput Netw 55:3256–3274. doi:10.1016/j.comnet.2011.06.015

    Article  Google Scholar 

  • Wang Y (2010) Study on energy conservation in MANET. J Netw 5:708–715

    Google Scholar 

  • Woungang I, Dhurandher S K, Sahai M (2013) An energy-aware secured routing protocol for mobile ad hoc networks using trust-based multipath. In: Grid and pervasive computing, vol 7861 of the series lecture notes in computer science. Springer, Berlin, pp 517–525. doi:10.1007/978-3-642-38027-3_55. ISBN: 978-3-642-38026-6

  • Yang H, Shu J, Meng X, Lu S (2006) SCAN: self-organized network-layer security in mobile ad hoc networks. IEEE J Sel Areas Commun 24:261–273. doi:10.1109/JSAC.2005.861384

    Article  Google Scholar 

  • Yang T, Wei L (2007) Modified energy-aware DSR routing for ad hoc network. In: Proceedings of the international conference on wireless communications, networking and mobile computing (WiCom 2007), pp 1601–1603. doi:10.1109/WICOM.2007.403

  • Zapata MG (2002) Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Comput Commun 6:106–107. doi:10.1145/581291.581312

    Article  Google Scholar 

  • Zhang Y, Lee W (2005) Security in mobile ad-hoc networks. In: Ad hoc networks, pp 249–268. doi:10.1007/0-387-22690-7_9. ISBN: 978-0-387-22689-7

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepika Kukreja.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kukreja, D., Dhurandher, S.K. & Reddy, B.V.R. Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. J Ambient Intell Human Comput 9, 941–956 (2018). https://doi.org/10.1007/s12652-017-0496-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-017-0496-2

Keywords

Navigation